Oracle Advanced Support Gateway Security Guide: Part No: E40643-49
Oracle Advanced Support Gateway Security Guide: Part No: E40643-49
Security Guide
For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at http://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc.
Access to Oracle Support
Oracle customers that have purchased support have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?
ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.
Référence: E40643-49
Copyright © 2023, Oracle et/ou ses affiliés.
Restrictions de licence/Avis d'exclusion de responsabilité en cas de dommage indirect et/ou consécutif
Ce logiciel et la documentation qui l'accompagne sont protégés par les lois sur la propriété intellectuelle. Ils sont concédés sous licence et soumis à des restrictions d'utilisation et
de divulgation. Sauf stipulation expresse de votre contrat de licence ou de la loi, vous ne pouvez pas copier, reproduire, traduire, diffuser, modifier, accorder de licence, transmettre,
distribuer, exposer, exécuter, publier ou afficher le logiciel, même partiellement, sous quelque forme et par quelque procédé que ce soit. Par ailleurs, il est interdit de procéder à toute
ingénierie inverse du logiciel, de le désassembler ou de le décompiler, excepté à des fins d'interopérabilité avec des logiciels tiers ou tel que prescrit par la loi.
Exonération de garantie
Les informations fournies dans ce document sont susceptibles de modification sans préavis. Par ailleurs, Oracle Corporation ne garantit pas qu'elles soient exemptes d'erreurs et vous
invite, le cas échéant, à lui en faire part par écrit.
Avis sur la limitation des droits
Si ce logiciel, ou la documentation qui l'accompagne, est livré sous licence au Gouvernement des Etats-Unis, ou à quiconque qui aurait souscrit la licence de ce logiciel pour le
compte du Gouvernement des Etats-Unis, la notice suivante s'applique :
U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware,
and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer
software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the
use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system,
integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other
Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract. The terms governing the U.S. Government's use of Oracle cloud
services are defined by the applicable contract for such services. No other rights are granted to the U.S. Government.
Avis sur les applications dangereuses
Ce logiciel ou matériel a été développé pour un usage général dans le cadre d'applications de gestion des informations. Ce logiciel ou matériel n'est pas conçu ni n'est destiné à
être utilisé dans des applications à risque, notamment dans des applications pouvant causer un risque de dommages corporels. Si vous utilisez ce logiciel ou matériel dans le cadre
d'applications dangereuses, il est de votre responsabilité de prendre toutes les mesures de secours, de sauvegarde, de redondance et autres mesures nécessaires à son utilisation dans
des conditions optimales de sécurité. Oracle Corporation et ses affiliés déclinent toute responsabilité quant aux dommages causés par l'utilisation de ce logiciel ou matériel pour des
applications dangereuses.
Marques
Oracle et Java sont des marques déposées d'Oracle Corporation et/ou de ses affiliés. Tout autre nom mentionné peut correspondre à des marques appartenant à d'autres propriétaires
qu'Oracle.
Intel et Intel Inside sont des marques ou des marques déposées d'Intel Corporation. Toutes les marques SPARC sont utilisées sous licence et sont des marques ou des marques
déposées de SPARC International, Inc. AMD, Epyc, et le logo AMD sont des marques ou des marques déposées d'Advanced Micro Devices. UNIX est une marque déposée de The
Open Group.
Avis d'exclusion de responsabilité concernant les services, produits et contenu tiers
Ce logiciel ou matériel et la documentation qui l'accompagne peuvent fournir des informations ou des liens donnant accès à des contenus, des produits et des services émanant de
tiers. Oracle Corporation et ses affiliés déclinent toute responsabilité ou garantie expresse quant aux contenus, produits ou services émanant de tiers, sauf mention contraire stipulée
dans un contrat entre vous et Oracle. En aucun cas, Oracle Corporation et ses affiliés ne sauraient être tenus pour responsables des pertes subies, des coûts occasionnés ou des
dommages causés par l'accès à des contenus, produits ou services tiers, ou à leur utilisation, sauf mention contraire stipulée dans un contrat entre vous et Oracle.
Date de publication et mention de la version préliminaire de Disponibilité Générale ("Pre-GA")
Version préliminaire de Disponibilité Générale ("Pre-GA") : 15.01.2020
Avis sur la version préliminaire de Disponibilité Générale ("Pre-GA") de la documentation
Si ce document est fourni dans la Version préliminaire de Disponibilité Générale ("Pre-GA") à caractère public ou privé :
Cette documentation est fournie dans la Version préliminaire de Disponibilité Générale ("Pre-GA") et uniquement à des fins de démonstration et d'usage à titre préliminaire de la
version finale. Celle-ci n'est pas toujours spécifique du matériel informatique sur lequel vous utilisez ce logiciel. Oracle Corporation et ses affiliés déclinent expressément toute
responsabilité ou garantie expresse quant au contenu de cette documentation. Oracle Corporation et ses affiliés ne sauraient en aucun cas être tenus pour responsables des pertes
subies, des coûts occasionnés ou des dommages causés par l'utilisation de cette documentation.
Mention sur les informations confidentielles Oracle
INFORMATIONS CONFIDENTIELLES ORACLE. Destinées uniquement à un usage autorisé. Ne pas distribuer à des tiers.
Avis sur la reconnaissance du revenu
Si ce document est fourni dans la Version préliminaire de Disponibilité Générale ("Pre-GA") à caractère privé :
Les informations contenues dans ce document sont fournies à titre informatif uniquement et doivent être prises en compte en votre qualité de membre du customer advisory board ou
conformément à votre contrat d'essai de Version préliminaire de Disponibilité Générale ("Pre-GA") uniquement. Ce document ne constitue en aucun cas un engagement à fournir des
composants, du code ou des fonctionnalités et ne doit pas être retenu comme base d'une quelconque décision d'achat. Le développement, la commercialisation et la mise à disposition
des fonctions ou fonctionnalités décrites restent à la seule discrétion d'Oracle.
Ce document contient des informations qui sont la propriété exclusive d'Oracle, qu'il s'agisse de la version électronique ou imprimée. Votre accès à ce contenu confidentiel et son
utilisation sont soumis aux termes de vos contrats, Contrat-Cadre Oracle (OMA), Contrat de Licence et de Services Oracle (OLSA), Contrat Réseau Partenaires Oracle (OPN),
contrat de distribution Oracle ou de tout autre contrat de licence en vigueur que vous avez signé et que vous vous engagez à respecter. Ce document et son contenu ne peuvent en
aucun cas être communiqués, copiés, reproduits ou distribués à une personne extérieure à Oracle sans le consentement écrit d'Oracle. Ce document ne fait pas partie de votre contrat
de licence. Par ailleurs, il ne peut être intégré à aucun accord contractuel avec Oracle ou ses filiales ou ses affiliés.
Accessibilité de la documentation
Pour plus d'informations sur l'engagement d'Oracle pour l'accessibilité de la documentation, visitez le site Web Oracle Accessibility Program, à l'adresse : http://www.oracle.com/
pls/topic/lookup?ctx=acc&id=docacc.
Accès aux services de support Oracle
Les clients Oracle qui ont souscrit un contrat de support ont accès au support électronique via My Oracle Support. Pour plus d'informations, visitez le site http://www.oracle.com/
pls/topic/lookup?ctx=acc&id=info ou le site http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs si vous êtes malentendant.
Oracle Advanced Support Gateway Security Guide
Part No: E40643-49
Copyright © 2023, Oracle and/or its affiliates.
This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except
as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform,
publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is
prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation,
delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental
regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the
hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous
applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all
appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this
software or hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of
SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered
trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are
not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement
between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content,
products, or services, except as set forth in an applicable agreement between you and Oracle.
Access to Oracle Support
Oracle customers that have purchased support have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?
ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.
Référence: E40643-49
Copyright © 2023, Oracle et/ou ses affiliés.
Ce logiciel et la documentation qui l'accompagne sont protégés par les lois sur la propriété intellectuelle. Ils sont concédés sous licence et soumis à des restrictions d'utilisation et
de divulgation. Sauf stipulation expresse de votre contrat de licence ou de la loi, vous ne pouvez pas copier, reproduire, traduire, diffuser, modifier, accorder de licence, transmettre,
distribuer, exposer, exécuter, publier ou afficher le logiciel, même partiellement, sous quelque forme et par quelque procédé que ce soit. Par ailleurs, il est interdit de procéder à toute
ingénierie inverse du logiciel, de le désassembler ou de le décompiler, excepté à des fins d'interopérabilité avec des logiciels tiers ou tel que prescrit par la loi.
Les informations fournies dans ce document sont susceptibles de modification sans préavis. Par ailleurs, Oracle Corporation ne garantit pas qu'elles soient exemptes d'erreurs et vous
invite, le cas échéant, à lui en faire part par écrit.
Si ce logiciel, ou la documentation qui l'accompagne, est livré sous licence au Gouvernement des Etats-Unis, ou à quiconque qui aurait souscrit la licence de ce logiciel pour le
compte du Gouvernement des Etats-Unis, la notice suivante s'applique :
U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation,
delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental
regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the
hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.
Ce logiciel ou matériel a été développé pour un usage général dans le cadre d'applications de gestion des informations. Ce logiciel ou matériel n'est pas conçu ni n'est destiné à être
utilisé dans des applications à risque, notamment dans des applications pouvant causer un risque de dommages corporels. Si vous utilisez ce logiciel ou ce matériel dans le cadre
d'applications dangereuses, il est de votre responsabilité de prendre toutes les mesures de secours, de sauvegarde, de redondance et autres mesures nécessaires à son utilisation dans
des conditions optimales de sécurité. Oracle Corporation et ses affiliés déclinent toute responsabilité quant aux dommages causés par l'utilisation de ce logiciel ou matériel pour des
applications dangereuses.
Oracle et Java sont des marques déposées d'Oracle Corporation et/ou de ses affiliés. Tout autre nom mentionné peut correspondre à des marques appartenant à d'autres propriétaires
qu'Oracle.
Intel et Intel Xeon sont des marques ou des marques déposées d'Intel Corporation. Toutes les marques SPARC sont utilisées sous licence et sont des marques ou des marques
déposées de SPARC International, Inc. AMD, Opteron, le logo AMD et le logo AMD Opteron sont des marques ou des marques déposées d'Advanced Micro Devices. UNIX est une
marque déposée de The Open Group.
Ce logiciel ou matériel et la documentation qui l'accompagne peuvent fournir des informations ou des liens donnant accès à des contenus, des produits et des services émanant de
tiers. Oracle Corporation et ses affiliés déclinent toute responsabilité ou garantie expresse quant aux contenus, produits ou services émanant de tiers, sauf mention contraire stipulée
dans un contrat entre vous et Oracle. En aucun cas, Oracle Corporation et ses affiliés ne sauraient être tenus pour responsables des pertes subies, des coûts occasionnés ou des
dommages causés par l'accès à des contenus, produits ou services tiers, ou à leur utilisation, sauf mention contraire stipulée dans un contrat entre vous et Oracle.
Accès aux services de support Oracle
Les clients Oracle qui ont souscrit un contrat de support ont accès au support électronique via My Oracle Support. Pour plus d'informations, visitez le site http://www.oracle.com/
pls/topic/lookup?ctx=acc&id=info ou le site http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs si vous êtes malentendant.
Contents
9
Contents
11
12 Oracle Advanced Support Gateway Security Guide • September 2023
Oracle Advanced Support Gateway Security
Guide
This document outlines the requirements for deploying Oracle Advanced Support Gateway
(hereafter referred to as "the Gateway") into the customer environment to support the delivery
of certain Oracle remote services (hereafter referred to as Oracle Services.) The Gateway is an
important part of the Oracle delivery architecture for Oracle Services and its placement must
be carefully considered in order for Oracle to deliver Oracle Services. This document outlines
network configuration options when integrating the Gateway device within the customer
environment. To help explain these options, this document assumes a "simple" customer-side
network topology. However, these options can extend to more complex network topologies.
The Gateway platform is based on the Oracle Linux operating system and hosts a full set
of Oracle software stacks, including Automated Service Request (ASR), Oracle Enterprise
Manager 13c, patch management (such as YUM services), and a suite of Java applications.
Together, these applications aggregate and route telemetry messages from the customer
environment to the Oracle Support Services infrastructure. The Gateway provides remote access
for Oracle engineers to access the customer network (with customer permission) and to carry
out approved actions on customers' monitored systems.
General Requirements
There are a number of general requirements that are necessary for Oracle to deliver Oracle
Services:
In order to expedite the implementation process, the customer will be required to provide high
level network topology which should include:
■ IP numbering scheme
■ Routing policy
■ Locations of firewalls
■ Locations of monitored systems
■ Proposed location of Gateway
Having this information enables Oracle to provide a recommendation regarding the Gateway
placement.
■ We have removed one of the firewall rules for external traffic between the Gateway and the
Oracle Services Support Center. This rule - for which the destination was ccr.oracle.com -
was used to upload diagnostic data to a Service Request (SR) from the database monitoring.
The firewall rules must be set up to allow traffic flow in two situations:
■ Between the Gateway and Oracle Services Support centers. This is referred to as the
external connection.
Note - A web proxy can be used to proxy the HTTPS traffic across the external connection.
However, the Gateway does not support NTLM or Kerberos proxy authentication. Transport
Layer Security (TLS) VPN traffic can be routed through an unauthenticated proxy server.
Caution - To defend against security attacks, you should never connect the Gateway interfaces
or the Oracle ILOM Service Processor to a public network, such as the Internet. The Gateway
should never be exposed directly to the Internet without the protection of a customer firewall or
Access Control List (ACL.) You should keep the Oracle ILOM Service Processor management
traffic on a separate management network and grant access only to system administrators. For
further information, see the section on Securing the Physical Management Connection in the
Oracle ILOM Security Guide.
■ Between the Gateway and the customer's monitored devices, through a customer-controlled
firewall or other security devices. This is referred to as the internal connection.
The diagram below depicts an example traffic flow between monitored systems and Oracle.
(Detailed firewall rules and templates are provided to the customer during the implementation
process.)
External Connection
Oracle utilizes a combination of a VPN solution and to secure communications between the
Gateway, located within the customer's environment, and the Oracle Services Support center
locations. The VPN is primarily used for tasks such as facilitating patching requirements from
Oracle Services Support center locations to the Gateway and TLS is used for transporting the
monitoring telemetry from the Gateway to the Oracle Services Support center locations.
■ Connection based on TLS, AES256 symmetric encryption to ensure traffic integrity and
confidentiality
■ Continuous VPN connection availability through the use of active/passive VPN cluster
servers at the Oracle Services Support centers. Any hardware or software issues on the
active VPN server failover all connections to the backup VPN.
■ Disaster recovery processes that use multiple clusters around the world. Any connection
issue with one of the Oracle Services Support centers failover client connections to the other
Oracle Services Support centers.
Note - The TLS VPN is the standard method for establishing the connection with Oracle.
Alternative connection methods are available on an exception, customer-by-customer basis
that is summarized in “Alternative External Connection Option” on page 17. If you wish to
explore these options further, please contact your Oracle Implementation Manager.
■ A public IP per Gateway connection supplied by the customer for use inside the VPN
encryption domain;
■ Access to one /26 subnet and multiple /32 addresses inside the encryption domain;
■ Allowing the ports and protocols listed in the table specifying firewall rules between
the Gateway and Oracle standalone hosts in this guide (see “Firewall Rules Between the
Gateway and Oracle Standalone Hosts” on page 43) to communicate across the VPN;
■ Network Address Translation (NAT) can be used for the source address of the Gateway
outbound to the Internet for external communication back to Oracle. For the Oracle Service
endpoints to which the Gateway needs to communicate, NAT is not supported. These Oracle
Service endpoints must reside on their public IP addresses.
Note - Remote VPN Access functionality is not available for all Oracle Connected Services.
Please refer to your Oracle representative for further details.
The Remote VPN Access feature is described in Oracle Advanced Support Gateway User's
Guide. See the Advanced Support Gateway Documentation Library.
Internal Connection
Placing the Gateway in a customer's DMZ that is not directly exposed to the Internet is the
recommended internal connection option. By placing the Gateway in a DMZ behind an Internet
firewall, the customer has control of traffic traversing their internal networks and also of
inbound connections from the Internet.
Note - The final port and firewall requirements depend on the specific Engineered System
being monitored by Oracle Services, the connectivity method chosen, and the actual customer
network design.
The following table outlines firewall port configurations and tables that provide information on
monitoring requirements. Each table is associated with the services and systems which apply
to it, for example, All Services means all remotely delivered services: Oracle Platinum Services
and Oracle Advanced Monitoring and Resolution.
TABLE 1 Firewall Rules Tables, Other Monitoring Tables and Applicable Oracle Services and Systems
Table Description Applicable Oracle Services/Systems
“Firewall Rules for External Traffic” on page 20 All Oracle Services
“Firewall Rules Between the Gateway and the Customer Network” on page 23 ■ Oracle Platinum Services
■ Oracle Advanced Monitoring and Resolution
“Firewall Rules for Gateway Hardware Self-Monitoring” on page 24 ■ Oracle Platinum Services
■ Oracle Advanced Monitoring and Resolution
“Firewall Rules Between the Gateway and Exadata” on page 25 ■ Oracle Platinum Services
■ Oracle Advanced Monitoring and Resolution
“Firewall Rules Between the Gateway and ZDLRA” on page 28 ■ Oracle Platinum Services
■ Oracle Advanced Monitoring and Resolution
“Firewall Rules Between the Gateway and ZFS” on page 30 ■ Oracle Platinum Services
■ Oracle Advanced Monitoring and Resolution
“Firewall Rules Between the Gateway and Exalogic” on page 31 ■ Oracle Platinum Services
■ Oracle Advanced Monitoring and Resolution
“Firewall Rules Between the Gateway and SuperCluster” on page 34 ■ Oracle Platinum Services
■ Oracle Advanced Monitoring and Resolution
“Firewall Rules Between the Gateway and Exalytics” on page 37 Oracle Advanced Monitoring and Resolution
“Firewall Rules Between the Gateway and Oracle Database Oracle Advanced Monitoring and Resolution
Appliance” on page 38
“Firewall Rules Between the Gateway and Oracle Big Data Oracle Advanced Monitoring and Resolution
Appliance” on page 40
“Firewall Rules Between the Gateway and Oracle Private Cloud ■ Oracle Platinum Services
Appliance” on page 41 ■ Oracle Advanced Monitoring and Resolution
“Firewall Rules Between the Gateway and Oracle Standalone Oracle Advanced Monitoring and Resolution
Hosts” on page 43
“Firewall Rules Between the Gateway and Oracle Third-Party Oracle Advanced Monitoring and Resolution
Hosts” on page 45
“Firewall Rules for External Traffic Through the Encrypted VPN ■ Oracle Platinum Services
Tunnel” on page 21 ■ Oracle Advanced Monitoring and Resolution
“The Monitoring Matrix” on page 46 ■ Oracle Platinum Services
■ Oracle Advanced Monitoring and Resolution
Note - The source for all these entries is the Gateway. The rules in Table 2, “Firewall Rules
Between the Gateway and the Oracle Services Support Center,” on page 20 apply to all
of Oracle's Connected Services. In order to log in to the Gateway portal, your local browser
is redirected to https://amr.oracle.com and https://login-ext.identity.oraclecloud.com for the
authentication and authorization required.
TABLE 2 Firewall Rules Between the Gateway and the Oracle Services Support Center
TABLE 3 Firewall Rules between the Gateway and the Oracle Data Center Using VPN Tunnel
Source Destination Network Protocol/Port Purpose
Gateway ■ 192.206.43.197/32 NTP (UDP/123) Network Time Protocol (NTP)
■ 198.51.38.199/32
■ 137.254.105.5
Gateway 192.206.43.194/32 Syslog (TCP/514) Gateway Syslog
Gateway 198.51.38.194/32 HTTPS (TCP/8080,9898) Gateway file integrity
monitoring
To see which of the following tables apply for Oracle Platinum Services, please see the Oracle-
certified Platinum Services configurations on the Oracle Support website.
Note - If communication between management interfaces (that are connected to the Cisco IP
switch within the Engineered System) is separated by a firewall, Access Control List (ACL),
or any form of network filtering, the firewall rules must allow communication between these
interfaces.
■ “Firewall Rules Between the Gateway and the Customer Network” on page 23
■ “Firewall Rules for Gateway Hardware Self-Monitoring” on page 24
■ “Firewall Rules Between the Gateway and Exadata” on page 25
■ “Firewall Rules Between the Gateway and ZDLRA” on page 28
TABLE 4 Firewall Rules Between the Gateway and the Customer Network
Note - This functionality is required only if the Gateway ILOM has been configured on a
different network than the Gateway Ethernet network interfaces.
DB Node
DB Node ILOM
PDU
Cisco Switch
OEM Gateway DB Node and DomU TCP/1830- OEM Agent communication;
1839 typically port 1830 is used for
Oracle Services
SNMP Gateway Infiniband UDP/161 SNMP for ASR telemetry
PDU
Cisco Switch
Cell Node
DB Node ILOM
DB Node
DB Node ILOM
HTTPS Gateway Cell Node ILOM TCP/443 Monitoring configuration and fault
diagnostic collection
DB Node ILOM
Infiniband
HTTPS DB Node and DomU Gateway TCP/443 Patch Download Service for
patching support.
HTTP/ Gateway PDU TCP/80 PDU web interface for monitoring
HTTPS Note - In late Exadata X4-2 and (HTTP) configuration and diagnostics
X5-2 or above, the PDU Web
interface can only be accessed Or
using HTTPS (not HTTP.)
TCP/443
(HTTPS)
SSH/SCP Gateway Infiniband TCP/22 Monitoring configuration, fault
diagnostics, and patching
Cell Node
DB Node ILOM
PDU
SSH/SCP DB Node and DomU Infiniband TCP/22 Monitoring of hardware components
Cell Node
DB Node
DB Node ILOM
PDU
Cisco Switch
SNMP DB Node and DomU PDU UDP/161 Monitoring of hardware components
Cisco Switch
SSH/SCP Gateway Cisco Switch TCP/22 (SSH/ Monitoring configuration, fault
SCP) diagnostics, and patching
Cisco Switch
Cell Node
DB Node ILOM
DB Node
HTTP Cell Node ILOM Gateway TCP/8234 ASR assets to communicate with
ASR manager
Cell Node
DB Node ILOM
DB Node
Cisco switch
Infiniband
TABLE 7 Firewall Rules Between the Gateway and Zero Data Loss Recovery Appliance
PDU
Cisco Switch
Storage Node
Compute Node
SNMP Compute Node and DomU PDU UDP/161 Monitoring of hardware components
Cisco Switch
ASR Gateway Infiniband TCP/6481 ASR for discovery and monitoring
by service tags
Storage Node
Compute Node
Infiniband
HTTPS Compute Node Gateway TCP/443 Patch Download Service for
patching support.
Compute Node
PDU
SSH/SCP Gateway Cisco Switch TCP/22 (SSH/ Monitoring configuration, fault
SCP) diagnostics, and patching
SQL Gateway DB listener IP (VIP) DB listener DB listener port for discovery and
Note - If a database is only port, default is ongoing monitoring
listening on a Client/VIP, then TCP/1521
access to this interface must also
be allowed)
RCMP+ Gateway Storage Node ILOM UDP/623, Management and monitoring via
TCP/623 ILOM interface (IPMI)
Compute Node ILOM
HTTPS Compute Node Gateway TCP/1159 OEM agent communication to the
(OEM Gateway
Agent) Note - For Zero Data Loss
Recovery Appliance, customers
must add static routes to force
all traffic with the Gateway as its
destination to use the Management
Network as a primary interface
for communication. The static
route must be permanent because
in the event of any restart of the
nodes, the route will be deleted and
communication between the agents
and the Gateway will go down.
SNMP Infiniband Gateway UDP/162 SNMP for monitoring events and/or
network monitoring
PDU
Cisco Switch
Storage Node
Compute Node
HTTP Storage Node ILOM Gateway TCP/8234 ASR assets to communicate with
ASR manager
Storage Node
Compute Node
Cisco Switch
Inifiniband
TABLE 8 Firewall Rules Between the Gateway and ZFS Storage Appliance Racked System
Application Source Interface(s) Destination Interface(s) Network Purpose
Protocol Protocol/Port
ICMP All monitored interfaces Gateway ICMP Type 0 Used to test network connectivity
and 8 between customer systems and the
Gateway
ICMP Gateway All monitored interfaces ICMP Type 0 Used to test network connectivity
and 8 between the Gateway and customer
systems
SSH/SCP Gateway ZFS Controllers TCP/22 Monitoring configuration, fault
diagnostics, and patching
ZFS ILOM
Cisco Switch
SSH/SCP Gateway PDU TCP/22 Monitoring configuration, fault
diagnostics, and patching
HTTPS Gateway PDU TCP/443 PDU web interface for monitoring
(HTTPS) configuration and diagnostics
HTTPS Gateway ZFS ILOM TCP/443 Monitoring configuration and fault
diagnostic collection
HTTPS Gateway ZFS Controllers TCP/215 OEM plug-in communication to ZFS
for monitoring
SNMP Gateway PDU UDP/161 SNMP for ASR telemetry
ZFS ILOM
Cisco Switch
SNMP PDU Gateway UDP/162 SNMP for Monitoring Events
Cisco Switch
RCMP+ Gateway ZFS ILOM UDP/623, Management and monitoring using
TCP/623 the ILOM interface (IPMI)
ZFS Phone ZFS Controllers ■ asr-services.oracle.com TCP/443 or ZFS Phone Home can also support
Home ■ inv-cs.oracle.com proxy port an internet proxy
Cisco Switch
Note - ZFS reporting for ASR is an exception as error telemetry is reported directly to Oracle
using port 443.
PDU
Cisco Switch
Compute Node
Virtual Instances
ASR Gateway Compute Node TCP/6481 ASR for discovery and monitoring
by service tags
Compute Node ILOM
Infiniband
HTTPS Gateway Compute Node ILOM TCP/443 Monitoring configuration and fault
diagnostic collection
Infiniband
ZFS ILOM
HTTPS Compute Node Gateway TCP/443 Patch Download Service for
patching support.
OVS Compute Node
Control VMs
SNMP Gateway ZFS ILOM UDP/161 SNMP for ASR telemetry
ZFS Controllers
HTTP/HTTPS Gateway PDU TCP/80 (HTTP) PDU web interface for monitoring
Note - In late Exalogic X4-2 and configuration and diagnostics
X5-2 or above, the PDU Web Or
interface can only be accessed
using HTTPS (not HTTP.) TCP/443
(HTTPS)
SSH/SCP Gateway PDU TCP/22 Monitoring configuration, fault
diagnostics, and patching
SSH/SCP Gateway Infiniband TCP/22 Monitoring configuration, fault
diagnostics, and patching
Control VMs (virtual only)
ZFS Controllers
Compute Node
PDU
Cisco Switch
Compute Node
ZFS Controllers
ZFS ILOM
Infiniband
PDU
Cisco Switch
Primary Domains
Primary Domains
Cell Node
Infiniband
ZFS ILOM
ZFS ILOM
Cell Node
PDU
All Domains
ZFS ILOM
WebLogic Gateway WebLogic instances TCP/7001-7002 Monitoring install and
diagnostics collection
HTTPS (OEM All Domains Gateway TCP/1159 OEM agent communication to
Agent) the Gateway
Zones based on Note - For SuperCluster,
monitoring service customers must add static routes
to force all traffic with the
Gateway as its destination to
use the Management Network
as a primary interface for
communication. The static route
must be permanent because in
the event of any restart of the
nodes, the route will be deleted
and communication between the
agents and the Gateway will go
down.
SNMP Primary Domains Gateway UDP/162 SNMP for monitoring events
Infiniband
PDU
Cisco Switch
Cell Node
Cell Node
ZFS
ZFS ILOM
Infiniband
Exalytics ILOM
ASR Gateway Exalytics and Exalytics TCP/6481 ASR for discovery and
ILOM monitoring by service tags
OEM Gateway Exalytics Domains TCP/1830-1839 OEM Agent communication,
typically 1830 is used for
DomU Oracle Services
SSH/SCP Gateway Exalytics Domains TCP/22 Monitoring configuration,
fault diagnostics, and
DomU patching
Dom0
ILOM
SNMP Exalytics CDom and Gateway UDP/162 SNMP for monitoring events
ILOM and/or network monitoring
HTTPS (OEM Agent) Exalytics Domains and Gateway TCP/1159 OEM agent communication
DomU to the Gateway
RCMP+ Gateway Exalytics ILOM UDP/623, TCP/623 Management and monitoring
via ILOM interface (IPMI)
HTTPS Gateway Exalytics TCP/443 Monitoring configuration and
fault diagnostic collection
Exalytics ILOM
HTTPS Exalytics Domains, Gateway TCP/443 Patch Download Service for
DomU, and Dom0 patching support.
HTTP Exalytics ILOM Gateway TCP/8234 ASR assets to communicate
with ASR manager
Exalytics Domains
Exalytics CDom
TABLE 12 Firewall Rules Between the Gateway and Oracle Database Appliance
Compute Node
HTTP DB Gateway TCP/8234 ASR assets to communicate
with ASR manager
Compute Node
TABLE 13 Firewall Rules Between the Gateway and Oracle Big Data Appliance
Application Protocol Source Interface(s) Destination Interface(s) Network Protocol/Port Purpose
ICMP All monitored Gateway ICMP Type 0 and 8 Used to test network
interfaces connectivity between
customer systems and the
Gateway
ICMP Gateway All monitored interfaces ICMP Type 0 and 8 Used to test network
connectivity between the
Gateway and customer
systems
SNMP Gateway Infiniband UDP/161 SNMP for ASR telemetry
PDU
Cisco Switch
Compute Node
SSH/SCP Gateway Infiniband TCP/22 Monitoring configuration,
fault diagnostics, and
DomU patching
PDU
SNMP Infiniband Gateway UDP/162 SNMP for monitoring events
and/or network monitoring
PDU
Cisco Switch
Infiniband
PCA 3.x has been re-engineered and now has different access requirements. While PCA 2.4.x
and earlier versions are still supported, and have the same access requirements as before, we
have added updates to PCA 3.0.x.
Note - PCA 3.0.x is supported only on Gateway 21.6 and higher versions running Oracle Linux
8.x.
■ Table 14, “Firewall Rules Between the Gateway and Oracle Private Cloud Appliance (PCA)
2.4.x,” on page 42.
■ Table 15, “Firewall Rules Between the Gateway and Oracle Private Cloud Appliance (PCA)
3.0.x,” on page 43.
TABLE 14 Firewall Rules Between the Gateway and Oracle Private Cloud Appliance (PCA) 2.4.x
TABLE 15 Firewall Rules Between the Gateway and Oracle Private Cloud Appliance (PCA) 3.0.x
Application Source Interface(s) Destination Interface(s) Network Purpose
Protocol Protocol/Port
ICMP PCA management nodes Gateway ICMP Type 0 Used to test network connectivity
public addresses and 8 between customer systems and the
Gateway
ICMP Gateway PCA management nodes public ICMP Type 0 Used to test network connectivity
addresses and 8 between the Gateway and customer
systems
HTTPS PCA management nodes Gateway TCP/443 PCA monitoring subsystem to
public addresses communicate with the Gateway
ASR Manager
HTTP PCA management nodes Gateway TCP/8234 PCA ASR Manager to communicate
public addresses with the Gateway ASR Manager
SSH/SCP Gateway PCA management node public TCP/22 Monitoring configuration, fault
addresses and virtual IP address diagnostics, and patching
HTTPS Gateway PCA management node public TCP/443 Management Interface Access for
addresses and virtual IP address monitoring configuration, fault
diagnostics, and troubleshooting
TABLE 16 Firewall Rules Between the Gateway and Oracle Standalone Hosts
Application Source Interface(s) Destination Interface(s) Network Purpose
Protocol Protocol/Port
ICMP All monitored interfaces Gateway ICMP Type 0 Used to test network connectivity
and 8 between customer systems and the
Gateway
ICMP Gateway All monitored interfaces ICMP Type 0 Used to test network connectivity
and 8 between the Gateway and customer
systems
SNMP Gateway Host UDP/161 SNMP for ASR telemetry
ZFS Controllers
ZFS ILOM
Note - ILOMs on non-Oracle hardware can be monitored by the Oracle Advanced Monitoring
and Resolution service. ILOMs on non-Oracle hardware cannot be monitored by Oracle
Platinum Services or Oracle Auto Service Request (ASR).
TABLE 17 Firewall Rules Between the Gateway and Third-Party Standalone Hosts
Application Source Interface(s) Destination Interface(s) Network Purpose
Protocol Protocol/Port
ICMP All monitored interfaces Gateway ICMP Type 0 Used to test network connectivity
and 8 between customer systems and the
Gateway
ICMP Gateway All monitored interfaces ICMP Type 0 Used to test network connectivity
and 8 between the Gateway and customer
systems
SNMP Gateway Host UDP/161 SNMP for ASR telemetry
Systems, Lifecycle Support Services, and Advanced Monitoring and Resolution. The Gateway
runs Oracle Enterprise Manager Cloud Control to perform its monitoring. Oracle Enterprise
Manager Cloud Control requires agents to be installed on hosts, and then uses various plug-
ins to monitor those devices that cannot be monitored directly. This section describes the
monitoring method for a device and the configuration to be performed.
Oracle Server
Engineered ZFS Array Storage No Oracle ZFS Appliance No Yes
System Heads (configured
by the
customer)
Host
Device Monitor
Host
Exalogic Exalogic Control VM Yes Host No No
Host
SuperCluster Logical Domains Yes Yes No (covered
by Control
Domain)
Standalone Server (including other Yes Oracle Engineered System ILOM Server Yes Yes
Engineered System nodes and VMs, for (if Oracle hardware)
example: ODA, BDA, Exalytics)
Systems Infrastructure Server
Host
Standalone ZFS Array Storage Heads No Oracle ZFS Storage Appliance No Yes
(configured
by the
customer)
■ For Solaris systems, the explorer tool may be scheduled to execute once per week at 11 PM
on Sunday in root’s crontab.
■ For some Solaris systems, host-based fault telemetry is configured for ASR, either updating
snmpd.confor using asradm, and starting the required services.
■ ILOMs are configured to send SNMP traps to the Gateway for all ILOM detected faults of
level minor or above for ASR.
Note - For Exadata Nodes, the ILOM rules are configured on the operating system of the
node using the Exadata CLIs (cellcli and dbmcli) rather than directly on the ILOM.
Note - For Exalogic Virtual Machines, a further file is copied from the physical host to
/var/exalogic/info to define it as part of an Exalogic.
■ Install or upgrade the Oracle Autonomous Health Framework (AHF) to a minimum version
of 22.3.1.
The storage requirement for AHF is 2GB of space in /opt and a minimum of 6GB (with a
recommendation of 10GB) on /u01.
■ Configure Oracle Autonomous Health Framework (AHF) to auto-update from the Gateway
when a new version is available.
The changes that are made to these systems are performed in three stages:
■ Create a user on the ILOM of the system to allow Oracle to access the ILOM and the
console of the system during troubleshooting. The default username is orarom.
■ When the system is discovered by Oracle Enterprise Manager Cloud Control, it creates
SSH/SCP keys from the monitoring user on the database node(s) to the cellmonitor user
within the storage cell.
■ Update the snmpsubscribers in the cell software to send the traps to the Gateway for ASR
and the Enterprise Manager Agents. This removes any current subscribers that have a type
of ASR.
■ Update the notificationpolicy in the cell software to include "critical,warning,clear".
■ Update the notificationmethod in the cell software to include snmp.
The SSH/SCP keys for Exadata and SuperCluster systems are configured at discovery time.
For the other systems, these are created manually by the installation engineer during the
implementation prior to the target discoveries.
Note - The profile may be updated if the option for Oracle to retain sudo privilege is granted.
This list of commands is used by the Oracle Virtual Platform and Oracle Server target types to
read information about the system and relay the information to OEM.
Note - The profile may be updated if the option for Oracle to retain sudo privilege is granted.
This list of commands is used by the Oracle Enterprise Manager (OEM) targets to read
information about the system and relay the information to OEM.
Note - The profile may be updated if the option for Oracle to retain sudo privilege is granted.
■ Update the (v)fstab to ensure the filesystem is mounted from the ZFS storage array at boot
time.
■ Mount the filesystem on the required directory.
■ Install and configure the Exalogic Lifecycle Toolkit, release 14.2.
Refer to the Exalogic Lifecycle Tools Note 1912063.1 on the My Oracle Support
(MOS) website at: https://support.oracle.com/epmos/faces/DocumentDisplay?
id=1912063.1.
■ A user (orarom) will be granted the following privileges in the sudoers file:
<user> <user> ALL= NOPASSWD: /usr/sbin/dmidecode, /sbin/ethtool, /usr/bin/
ipmitool, /usr/sbin/imageinfo, /usr/local/bin/imageinfo, /opt/oracle/bda/
bin/imageinfo
Note - The profile may be updated if the option for Oracle to retain sudo privilege is
granted.
■ Execute the workflow “Configure for Oracle Enterprise Manager”. This always has the
recreateWorksheet setting enabled. If the oracle_agent user and role are already created,
then the recreateUser setting is not enabled. Otherwise it is enabled. If the user is set to be
recreated, the password used is a strong, randomly generated, 16-character password.
Note - The customer can change the password on the oracle_agent user without affecting
the Oracle monitoring solution.
■ Create a new user for the Oracle monitoring solution using the role oracle_agent created by
the above workflow. The default username is orarom, but the name is customizable from the
Service Implementation Worksheet (SIW).
■ Enable advanced_analytics for the new user created above.
The table below outlines the utilization impact that OEM has on the monitored systems.
TABLE 19 Utilization Impact of Oracle Enterprise Manager Cloud Control Agent on Monitored
Systems
Backout Plan
If it is necessary for the installation to be rolled back, Oracle will:
■ Shut down the agents that have been configured;
■ Work with the customer to schedule a maintenance window to remove the agents and trap
destinations for all the devices configured for monitoring.
During activation of database services, the following users and accounts are used to monitor the
database:
■ For storage/cluster monitoring, the user asmsnmp is used;
■ For database monitoring, the user dbsnmp is used;
■ For standby database monitoring, the user sys is used.
Note - Passwords for all of the above users must be available during installation. They can be
entered by the customer into the Gateway user interface when needed.
User Privileges
Oracle requires that the user can execute the following commands using root privileges:
■ <Service EM Base Directory>/agent_home/core/<version>/root.sh
■ <Service EM Base Directory>/agent_home/agent_*/root.sh
■ /opt/exalytics/asr/bda_mon_hw_asr.pl (Exalytics only)
■ /opt/oracle/oak/bin/oakcli (Oracle Database Appliance only)
■ /opt/oracle.cellos/compmon/exadata_mon_hw_asr.pl (Exadata only)
■ /opt/oracle.cellos/imageinfo (Exadata only)
■ /opt/exalogic/usr/sbin/imageinfo (Exalogic only)
■ /opt/oracle/dbserver/dbms/bin/dbmcli (Exadata and ZDLRA only)
■ /opt/oracle/bda/bin/imageinfo (Big Data only)
The user provided for the initial setup can be removed once the monitoring has been deployed
and the agent user has been created. The agent user can be a user defined within a naming
service and a home directory mounted from an NFS server. However, the agent installation
directory must be unique to each server to be monitored. If the agent user is configured as part
of a naming service, then the user must belong to the group that owns the Oracle inventory on
all of the servers. The deployment scripts will verify and enforce group write permissions on
any Oracle inventory directory that is discovered by using the /etc/oraInst.loc or the /var/
opt/oracle/oraInst.loc files.
If the user is part of a naming service and NFS mounts are to be defined (Exalogic systems
require NFS mounts), use NFSv4 rather than NFSv3. The configuration of NFSv4 is outside
the scope of this service, but the new mounts are defined with the NFSv4 options, and the
following extra command must be added to the security profile, depending on OS:
■ /usr/sbin/mount (Linux)
■ /sbin/mount (Solaris)
Note - The command paths are related to Solaris. For the Linux paths, please refer to the
sudo settings for Linux.
set uid=0
end
add cmd=/opt/ipmitool/sbin/ipmitool
set uid=0
end
add cmd=/usr/bin/chmod
set uid=0
end
add cmd=/usr/bin/chown
set uid=0
end
add cmd=/usr/bin/chgrp
set uid=0
end
add cmd=/usr/bin/crontab
set uid=0
end
add cmd=/usr/bin/cp
set uid=0
end
add cmd=/usr/bin/ex
set uid=0
end
add cmd=/usr/bin/vim
set uid=0
end
add cmd=/usr/bin/grep
set uid=0
end
add cmd=/usr/bin/ls
set uid=0
end
add cmd=/usr/sbin/groupadd
set uid=0
end
add cmd=/usr/bin/mkdir
set uid=0
end
add cmd=/usr/bin/rmdir
set uid=0
end
add cmd=/usr/bin/passwd
set uid=0
end
add cmd=/usr/bin/profiles
set uid=0
end
add cmd=/usr/lib/fm/notify/asr-notify
set uid=0
end
add cmd=/usr/sbin/svcadm
set uid=0
end
add cmd=/usr/sbin/useradd
set uid=0
end
add cmd=/usr/sbin/usermod
set uid=0
end
add cmd=/opt/exalogic/usr/sbin/imageinfo
set uid=0
end
add cmd=/usr/bin/tfactl
set uid=0
end
add cmd=/usr/bin/ahfctl
set uid=0
end
add cmd=<Service EM Base>/agent_home/agent_<version>/root.sh
set uid=0
end
add cmd=/tmp/install_ahf_no_cfg.sh
set uid=0
end
add cmd=/tmp/install_ahf.sh
set uid=0
end
If Oracle Enterprise Manager (OEM) agents are installed on an Exalogic, an NFS mount is
configured by Oracle, and the user must also have the following command added to the profile:
add cmd=/sbin/mount
set uid=0
end
To create the profile from the configuration file above, perform the following as root or as a
user with permission to create new profiles:
This provides the required level of access to perform the creation of the user and group
directories, as well as setting the permissions on the Oracle inventory.
If Oracle Enterprise Manager (OEM) agents are installed on an Exalogic, an NFS mount is
configured by Oracle, and the user must also have the following command added to the profile:
ACSSINITIAL:solaris:cmd:::/sbin/mount:uid=0
Once these entries have been added, update the user that will be used for the initial installation
to allow access to the profile:
usermod -P ACSSINITIAL <user>
The user must also have the sudo binary in their path to allow it to execute without a full path.
If the OEM agents are installed using an NFS mount that is to be configured by Oracle, then the
user must also have the following command alias created as assigned to the user:
/opt/oracle.cellos/imageinfo, \
/opt/oracle/dbserver/dbms/bin/dbmcli, \
/opt/exalogic/usr/sbin/imageinfo, \
/usr/sbin/imageinfo, /usr/sbin/xm, \
/usr/bin/tfactl, /usr/bin/ahfctl, \
/tmp/install_ahf_no_cfg.sh, /tmp/install_ahf.sh, \
/opt/oracle/bda/bin/imageinfo
/usr/bin/exachk
/opt/oracle.ahf/exachk/exachk
/usr/local/bin/imageinfo
/opt/oracle/bda/bin/imageinfo
/usr/sbin/pca-admin
/usr/bin/virsh
/usr/bin/systemctl enable oracle-oasgagent.service
/usr/bin/systemctl start oracle-oasgagent.service
/usr/bin/systemctl stop oracle-oasgagent.service
/usr/bin/systemctl restart oracle-oasgagent.service
/usr/bin/systemctl status oracle-oasgagent.service
/sbin/chkconfig --add oasgagent
/sbin/chkconfig --on oasgagent
/sbin/chkconfig --off oasgagent
/sbin/service oasgagent start
/sbin/service oasgagent stop
/sbin/service oasgagent restart
/sbin/service oasgagent status
The user must also have the sudo binary in their path to allow it to execute without a full path.
If Oracle Enterprise Manager (OEM) agents are installed on an Exalogic, an NFS mount is
configured by Oracle, and the user must also have the following command added to the profile:
Note - The systemctl command applies only to Oracle Linux (OL) 7 and later versions. The
service and chkconfig commands apply only to OL6 or earlier versions.
■ Read-Only: To view other ILOM properties, for example: host name, IP address, serial
number, and so on.
For example:
For information on which options are available for the various storage systems, refer to the
following sections.
Object Permissions
worksheet.*.* modify
stat.* ■ read
■ create
user.* ■ changePassword
■ changePreferences
■ changeProperties
■ changeRoles
■ create
workflow.*.* read
role.* ■ changeAuths
■ changeDescription
■ create
■ Execute the workflow outlined in the section “Configure for Oracle Enterprise Manager
Monitoring”, ensuring to select creation of the worksheet.
■ Create a new user for monitoring.
■ Assign the oracle_agent role to this user.
■ Set the preferences for the user to enable Advanced Analytics.
■ Add the stat.* create authorization to the oracle_agent role.
In order to provide monitoring and diagnostic collection on the ZFS ILOM, including initiating
an NMI to the host, the monitoring user requires the permissions cro.
Audit Logging
Note - Customers cannot themselves configure audit logging on Gateway 21.x. In order to set
up audit logging, customers are asked to open an SR to enable Oracle personnel to perform the
required configuration.
The audit logging feature of the Gateway provides audit information for four different
categories of system events. The four categories are:
■ Outbound network connections: The Linux firewall service (iptables) triggers notifications
for all outbound network traffic with the exception of traffic to Oracle managed hosts used
for monitoring and management (for example, Oracle VPN end points, dts.oracle.com,
support.oracle.com).
■ Outbound login activity: The Linux auditing service (auditd) triggers notifications for all
outbound login attempts initiated from the Gateway. This is done by monitoring usage of
the SSH/SCP system binaries. The Gateway sends a message that SSH/SCP has been used, by
which user, and when. The destination is not provided. auditd logs contain that information.
auditd logs are not directly accessible by the customer on the Gateway.
■ Inbound Gateway user login activity: The Linux auditing service (auditd) triggers
notifications each time any of the system logs used for tracking logins is updated. This
includes failed logins and successful login attempts. It also triggers a notification each
time a user logs in from a remote system. These activities are monitored using auditd and
forwarded to the customer's central logging system.
■ Enterprise Manager activity: The Enterprise Manager application logs any activity
performed within the application to any of the targets or their credentials. The activity in
Enterprise Manager is then forwarded to the customer's central logging system.
All audit notifications are delivered using standard syslog protocol. A central logging system
must be provided to accept and process these messages.
The format of most of these messages is based on auditd. They can be managed using various
auditd and related utilities.
These messages are generated by firewalld and represent all outbound network traffic with the
exception of traffic to known addresses used for Oracle monitoring.
The following example shows messages as they are seen on the system that receives the
forwarded syslog messages.
Start ssh
2022-12-09T11:41:55.587734-05:00 HS
gatewaynode.example.com HE [kern.info]
MS - 0:0:0:0:0:0:0:1 NA:
2022-12-09T17:20:26.946315+00:00 ct-
gateway-01 iptables: TCP_CONN_START
IN= OUT=enp1s0 SRC=gw.gw.gw.gw
DST=host.host.host.host LEN=60 TOS=
0x00 PREC=0x00 TTL=64 ID=55848 DF
PROTO=TCP SPT=16890 DPT=22
WINDOW=64240 RES=0x00 SYN URGP=0
UID=1000(jdoe) GID=1001(jdoe) MARK=
0x1
End of ssh
2022-12-09T11:41:55.587734-05:00 HS
gatewaynode.example.com HE [kern.info]
MS - 0:0:0:0:0:0:0:1 NA:
2022-12-09T17:20:36.450377+00:00 ct-
gateway-01 iptables: TCP_CONN_END IN=
OUT=enp1s0 SRC=gw.gw.gw.gw
DST=host.host.host.host LEN=40 TOS=
0x08 PREC=0x40 TTL=64 ID=55885 DF
PROTO=TCP SPT=16890 DPT=22
WINDOW=501 RES=0x00 ACK FIN URGP=0
UID=1000(setup) GID=1001(setup) MARK=
0x1
The following example shows a message as it is seen on the system that receives the forwarded
syslog messages.
The following examples show messages as they are seen on the system that receives the
forwarded syslog messages.
Sent: The ASR log entry has been delivered to Oracle ASR Infrastructure
To review the Oracle Support position for Oracle products running on virtualized environments,
see MOS Note 249212.1.
For more information about installing the Gateway, see Oracle Advanced Support Gateway
Installation Guide.
Understanding Responsibilities
This section lists the responsibilities of the Gateway customer and for Oracle. Refer to the
following sections:
Customer Responsibilities
The Customer is responsible for:
■ Notifying Oracle of issues with, or changes to, any of their connected services.
■ Providing advance notice and any required information to Oracle Support about any
upcoming scheduled maintenance tasks by creating a Change Management (CM) request
which is processed automatically.
■ Informing Oracle Support when databases managed or maintained by the Gateway are
added, moved, or deleted.
Tip - For Platinum customers who need to inform Oracle about upcoming changes to their
Platinum certified configurations, please see the Oracle Knowledge Management article:
How to Create Platinum Services Request [Video] (Doc ID 1958476.1).
■ Providing access to their connected systems as needed for the effective delivery of their
services.
Note - In certain limited cases, Oracle enables the customer to control remote access by
providing the capability to enable and disable VPN connectivity with Oracle (this feature is
sometimes referred to as "Green Button" functionality). Customers with remote VPN access
or another form of restricted access must work with Oracle, when requested, to perform the
required maintenance tasks on the Gateway.
■ Maintaining the list of contacts in the Oracle Advanced Support Portal address book.
■ Updating the passwords in the Gateway Password Management whenever passwords are
changed on their systems.
■ Monitoring emails and taking action as necessary.
Oracle Responsibilities
Oracle is responsible for:
■ Maintaining the infrastructure used for supporting the various services delivered via the
Gateway and related tools.
■ Processing and performing tasks based on customer requests and updates.
■ Identifying security risks promptly; developing and deploying a solution to address these
risks.
■ Customer: Creates a Service Request (SR) in My Oracle Support. Based on the type of
request, the SR is routed to the relevant Oracle team.
■ Oracle: Identifies the need for regular maintenance on the Gateway or a request to address
newly identified security risks.
Tip - For instructions on generating a CM request, please see the Oracle Knowledge
Management article: How to Create a Change Management Ticket for Planned/Scheduled
Outages on Oracle Advanced Support Platform (Doc ID 1663130.1).
FIGURE 3 High Level Gateway Change Management and Infrastructure Maintenance Workflow