SlideShare a Scribd company logo
1 of 3
Oracle
CMAN

CMAN
Port

Firewall
Rule

Oracle Connect ion Manager (CMAN)
Client
Config (cman.ora)
Listener
CMAN
Listen

CMAN
Firewall

Application
Server
(Layer 3)

TNS-1521

HTTP/HTTPS

-

HTTP/HTTPS

Firewall

TNS-1521

Firewall

``

HTTP/HTTPS

Connection
Manager
(Layer 2)

TNS-1521

TNS-1521

TNS-1521

Database
Server
(Layer 1)
CMAN

Listener
CMAN
Register CMAN

Register

Initialization Parameters
Remote Listener

CMAN

a

Listener
CMAN
Listener

b

SQLNET
# Configure TNS firewall to loopback and local IP address only
TCP.VALIDNODE_CHECKING = YES
TCP.EXCLUDED_NODES = (*.*.*.*)
TCP.INVITED_NODES = (127.0.0.1, 172.20.5.31,172.20.5.51,……)

SQLNET
INVITEND_NODES

IP
STOP/START

external procedure

Listener

Listener
listener.ora
Oracle Advanced Security (ASO)
ASO
SQLNET.ORA
Encryption
Application Server

Encrypt
Client

c

# Settings for when a client is connecting to this server.
# Incoming connections to database must be checksum'd and encrypted.
SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER= (SHA1)
SQLNET.CRYPTO_CHECKSUM_SERVER = required
SQLNET.ENCRYPTION_TYPES_SERVER= (AES256)
SQLNET.ENCRYPTION_SERVER = required
# Settings for when this client is connecting to a server.
SQLNET.CRYPTO_CHECKSUM_TYPES_CLIENT= (SHA1)
SQLNET.CRYPTO_CHECKSUM_CLIENT = required
SQLNET.ENCRYPTION_TYPES_CLIENT= (AES256)
SQLNET.ENCRYPTION_CLIENT = required
# Seed needs to be randomly generated consisting of between
# 10 and 70 characters. This seed should be different for each host.
SQLNET.CRYPTO_SEED = somerandomalphanumericstringofabout70characters

CMAN

Listen

Oracle Client
Port Number
IP Address

CMAN
CMAN
rule
N1=
(configuration=
(address=(protocol=tcp)(host=x.x.x.x)(port=1821))
(parameter_list =
(connection_statistics=yes)
(log_directory=/u01/oracle/product/11.2.0/client_1/network/log)
(log_level=off)
(idle_timeout=0)
(inbound_connect_timeout=0)
(session_timeout=0)
(outbound_connect_timeout=0)
(max_gateway_processes=16)
(min_gateway_processes=2)
(remote_admin=on)
(trace_directory=/u01/oracle/product/11.2.0/client_1/network/trace)
(trace_level=off)
(trace_timestamp=off)
(trace_filelen=1000)
(trace_fileno=1)
(max_cmctl_sessions=4)
(event_group=init_and_term,memory_ops)
)
(rule_list=
# INBOUND RULES
# = Application Server 1
(rule=(src=x.x.x.x)(dst=172.18.1.67)(srv=*)(act=accept))
# = DBA workstations
(rule=(src=172.21.2.0/24)(dst=*)(srv=*)(act=accept))
#
# OUTBOUND RULES
# = Remote DB Server
(rule=(src=172.20.5.0/24)(dst=172.18.1.67)(srv=*)(act=accept))
#
# Local Connections
(rule=(src=172.18.1.67)(dst=127.0.0.1)(srv=*)(act=accept))
(rule=(src=172.18.1.67)(dst=127.0.0.1)(srv=cmon)(act=accept))
#
# All other source IPs
(rule=(src=*)(dst=*)(srv=*)(act=drop))
)

Connection Manager

Client & Application Server
Application Server

Client


IPV6



More Related Content

What's hot

CCNA Routing and Switching Lesson 06 - IOS Basics - Eric Vanderburg
CCNA Routing and Switching Lesson 06 - IOS Basics - Eric VanderburgCCNA Routing and Switching Lesson 06 - IOS Basics - Eric Vanderburg
CCNA Routing and Switching Lesson 06 - IOS Basics - Eric VanderburgEric Vanderburg
 
Cisco Switch Security
Cisco Switch SecurityCisco Switch Security
Cisco Switch Securitydkaya
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port SecurityHamed Moghaddam
 
Nat mikrotik
Nat mikrotikNat mikrotik
Nat mikrotiklouisraj
 
KR2 Kyocera User Guide
KR2 Kyocera User GuideKR2 Kyocera User Guide
KR2 Kyocera User GuideAri Zoldan
 
How to configure port security in cisco switch
How to configure port security in cisco switchHow to configure port security in cisco switch
How to configure port security in cisco switchIT Tech
 
Honeywell alarmnet-internet-connectivity-test
Honeywell alarmnet-internet-connectivity-testHoneywell alarmnet-internet-connectivity-test
Honeywell alarmnet-internet-connectivity-testAlarm Grid
 
TCU upgrade and configure
TCU  upgrade and configureTCU  upgrade and configure
TCU upgrade and configureÄmjed Othman
 
Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortCisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortIPMAX s.r.l.
 
In depth understanding network security
In depth understanding network securityIn depth understanding network security
In depth understanding network securityThanawan Tuamyim
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214Mac An
 
Cisco router-commands
Cisco router-commandsCisco router-commands
Cisco router-commandsRobin Rohit
 

What's hot (20)

CCNA Routing and Switching Lesson 06 - IOS Basics - Eric Vanderburg
CCNA Routing and Switching Lesson 06 - IOS Basics - Eric VanderburgCCNA Routing and Switching Lesson 06 - IOS Basics - Eric Vanderburg
CCNA Routing and Switching Lesson 06 - IOS Basics - Eric Vanderburg
 
Cisco Switch Security
Cisco Switch SecurityCisco Switch Security
Cisco Switch Security
 
Ipref
IprefIpref
Ipref
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port Security
 
Nat mikrotik
Nat mikrotikNat mikrotik
Nat mikrotik
 
Configuracao de switch
Configuracao de switchConfiguracao de switch
Configuracao de switch
 
KR2 Kyocera User Guide
KR2 Kyocera User GuideKR2 Kyocera User Guide
KR2 Kyocera User Guide
 
Cap2 configuring switch
Cap2   configuring switchCap2   configuring switch
Cap2 configuring switch
 
How to configure port security in cisco switch
How to configure port security in cisco switchHow to configure port security in cisco switch
How to configure port security in cisco switch
 
Honeywell alarmnet-internet-connectivity-test
Honeywell alarmnet-internet-connectivity-testHoneywell alarmnet-internet-connectivity-test
Honeywell alarmnet-internet-connectivity-test
 
TCU upgrade and configure
TCU  upgrade and configureTCU  upgrade and configure
TCU upgrade and configure
 
Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortCisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch Port
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
 
In depth understanding network security
In depth understanding network securityIn depth understanding network security
In depth understanding network security
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
 
Laboratorio eaps con shared port
Laboratorio eaps con shared portLaboratorio eaps con shared port
Laboratorio eaps con shared port
 
Firewalls
FirewallsFirewalls
Firewalls
 
Cisco router-commands
Cisco router-commandsCisco router-commands
Cisco router-commands
 
Remote VPN
Remote VPNRemote VPN
Remote VPN
 
Sc manual
Sc manualSc manual
Sc manual
 

Similar to Cman

Security Concerns in LANs.pptx
Security Concerns in LANs.pptxSecurity Concerns in LANs.pptx
Security Concerns in LANs.pptxjoko
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacksdkaya
 
Solarwinds port requirement
Solarwinds port requirementSolarwinds port requirement
Solarwinds port requirementEzahir Amer
 
Preparing the Sentriant CE150 for Operation Module 7
 - - Training Sample
Preparing the Sentriant CE150 for Operation Module 7
 -  - Training SamplePreparing the Sentriant CE150 for Operation Module 7
 -  - Training Sample
Preparing the Sentriant CE150 for Operation Module 7
 - - Training SampleContent Rules, Inc.
 
(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet CountAmazon Web Services
 
Nexus 1000v part ii
Nexus 1000v part iiNexus 1000v part ii
Nexus 1000v part iiKrunal Shah
 
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCP
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCPKonfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCP
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCPWalid Umar
 
AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)Amazon Web Services
 
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part IICCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part IIAmir Jafari
 
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docxCCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docxketurahhazelhurst
 
12 module
12  module12  module
12 moduleAsif
 

Similar to Cman (20)

1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618) 1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
 
Ch6
Ch6Ch6
Ch6
 
Switch security
Switch securitySwitch security
Switch security
 
Security Concerns in LANs.pptx
Security Concerns in LANs.pptxSecurity Concerns in LANs.pptx
Security Concerns in LANs.pptx
 
Firewall
FirewallFirewall
Firewall
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacks
 
Solarwinds port requirement
Solarwinds port requirementSolarwinds port requirement
Solarwinds port requirement
 
Preparing the Sentriant CE150 for Operation Module 7
 - - Training Sample
Preparing the Sentriant CE150 for Operation Module 7
 -  - Training SamplePreparing the Sentriant CE150 for Operation Module 7
 -  - Training Sample
Preparing the Sentriant CE150 for Operation Module 7
 - - Training Sample
 
(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet Count
 
Nexus 1000v part ii
Nexus 1000v part iiNexus 1000v part ii
Nexus 1000v part ii
 
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCP
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCPKonfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCP
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCP
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
RAZORPOINT TCP/UDP PORTS LIST
RAZORPOINT TCP/UDP PORTS LISTRAZORPOINT TCP/UDP PORTS LIST
RAZORPOINT TCP/UDP PORTS LIST
 
AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)
 
security
securitysecurity
security
 
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part IICCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part II
 
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docxCCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
 
Cisco Equipment Security
Cisco Equipment SecurityCisco Equipment Security
Cisco Equipment Security
 
12 module
12  module12  module
12 module
 
Memcache as udp traffic reflector
Memcache as udp traffic reflectorMemcache as udp traffic reflector
Memcache as udp traffic reflector
 

More from Mohsen B

Problem details
Problem detailsProblem details
Problem detailsMohsen B
 
Using sap-netweaver-with-dbim-2594359
Using sap-netweaver-with-dbim-2594359Using sap-netweaver-with-dbim-2594359
Using sap-netweaver-with-dbim-2594359Mohsen B
 
Restore procedure
Restore procedureRestore procedure
Restore procedureMohsen B
 
Backup script
Backup scriptBackup script
Backup scriptMohsen B
 
Refresh standby using rman backup
Refresh standby using rman backupRefresh standby using rman backup
Refresh standby using rman backupMohsen B
 
Using a physical standby database for read write
Using a physical standby database for read writeUsing a physical standby database for read write
Using a physical standby database for read writeMohsen B
 
Automate DG Best Practices
Automate DG  Best PracticesAutomate DG  Best Practices
Automate DG Best PracticesMohsen B
 
Cygwin installation
Cygwin installationCygwin installation
Cygwin installationMohsen B
 
Huge pages
Huge pagesHuge pages
Huge pagesMohsen B
 
Simple network troubleshooting
Simple network troubleshootingSimple network troubleshooting
Simple network troubleshootingMohsen B
 
Rhel asmlib to_udev
Rhel asmlib to_udevRhel asmlib to_udev
Rhel asmlib to_udevMohsen B
 
Finding root blocker in oracle database
Finding root blocker in oracle databaseFinding root blocker in oracle database
Finding root blocker in oracle databaseMohsen B
 
Asm 11g r1_bestpractices_7_301
Asm 11g r1_bestpractices_7_301Asm 11g r1_bestpractices_7_301
Asm 11g r1_bestpractices_7_301Mohsen B
 
security-checklist-database
security-checklist-databasesecurity-checklist-database
security-checklist-databaseMohsen B
 
Oracle & sql server comparison 2
Oracle & sql server comparison 2Oracle & sql server comparison 2
Oracle & sql server comparison 2Mohsen B
 

More from Mohsen B (16)

Problem details
Problem detailsProblem details
Problem details
 
Using sap-netweaver-with-dbim-2594359
Using sap-netweaver-with-dbim-2594359Using sap-netweaver-with-dbim-2594359
Using sap-netweaver-with-dbim-2594359
 
Restore procedure
Restore procedureRestore procedure
Restore procedure
 
Backup script
Backup scriptBackup script
Backup script
 
Refresh standby using rman backup
Refresh standby using rman backupRefresh standby using rman backup
Refresh standby using rman backup
 
Using a physical standby database for read write
Using a physical standby database for read writeUsing a physical standby database for read write
Using a physical standby database for read write
 
Automate DG Best Practices
Automate DG  Best PracticesAutomate DG  Best Practices
Automate DG Best Practices
 
Rac
RacRac
Rac
 
Cygwin installation
Cygwin installationCygwin installation
Cygwin installation
 
Huge pages
Huge pagesHuge pages
Huge pages
 
Simple network troubleshooting
Simple network troubleshootingSimple network troubleshooting
Simple network troubleshooting
 
Rhel asmlib to_udev
Rhel asmlib to_udevRhel asmlib to_udev
Rhel asmlib to_udev
 
Finding root blocker in oracle database
Finding root blocker in oracle databaseFinding root blocker in oracle database
Finding root blocker in oracle database
 
Asm 11g r1_bestpractices_7_301
Asm 11g r1_bestpractices_7_301Asm 11g r1_bestpractices_7_301
Asm 11g r1_bestpractices_7_301
 
security-checklist-database
security-checklist-databasesecurity-checklist-database
security-checklist-database
 
Oracle & sql server comparison 2
Oracle & sql server comparison 2Oracle & sql server comparison 2
Oracle & sql server comparison 2
 

Cman