Oracle SBC Security Guide
naming policies. All management stations used for accounting monitoring services should have a permit
ACL configured.
Configuration is detailed in the ACLI Accounting Guide.
HDR over SFTP
The Historical Data Recording (HDR) feature allows the SBC to record data in comma-separated files
and periodically sends them to a remote file server. For added security, transfer the HDR record files
using SFTP. Note that public key authentication is not available for this feature so the SBC uses password
authentication. All management stations used for SFTP access should have a permit ACL configured.
Configuration is detailed in Section 3 “System Configuration” of the ACLI Configuration Guide.
Syslog
The syslog service should be used for sending system events from the SBC to a Security Event & Incident
Monitoring (SEIM) platform or to another operations monitoring platform. The information sent via
syslog is also contained locally on the SBC in the scmelog file.
See Appendix I: for examples of important syslog messages to monitor. The default syslog log level is
WARNING.
Configuration is detailed in Section 3 “Syslog and Process Logs” of the ACLI Configuration Guide.
Configuring AAA Integration
SSH RADIUS Authentication
The SBC management interface sends RADIUS requests containing login authentication and
authorization data to remote RADIUS servers.
The SBC supports the use of the Cisco Systems Inc.™ “Cisco-AVPair” vendor specific attribute (VSA).
The Vendor-ID is 1 and the Vendor-Type is 9. This attribute allows for successful administrator login to
servers that do not support the Oracle authorization VSA. While using RADIUS-based authentication, the
SBC authorizes you to enter Superuser mode locally even when your RADIUS server does not return the
ACME_USER_CLASS VSA or the Cisco-AVPair VSA.
All management stations used for SSH access should have a permit ACL configured. An ACL should also
be configured to allow RADIUS traffic to the RADIUS server.
For more information, see Section 4 “System Management” of the Maintenance and Troubleshooting
Guide.
TACACS+
TACACS+ is a protocol that was originally developed by Cisco Systems. It provides functions for
authentication, authorization, and encryption of the administrative traffic. Unlike RADIUS, it separates
authentication and authorization functions. The SBC acts as a TACACS+ client.
The Net-Net SBC uses TACACS+ services to provide administrative authorization. With TACACS+
authorization enabled, each individual ACLI command issued by an admin user is authorized by the
TACACS+ authorization service. The SBC replicates each ACLI command in its entirety, sends the
command string to the authorization service, and suspends command execution until it receives an
Comentarios a estos manuales