Securing 5620 SAM
Securing 5620 SAM
Alcatel-Lucent recognizes the importance of deploying important software such as the
5620 SAM in secure environments and, as such, supports the use of security techniques to
enhance the security of the 5620 SAM.
5620 SAM communications can be secured using SSL/TLS, SNMPv3 and HTTPS. See
the
5620 SAM | 5650 CPAM Installation and Upgrade Guide
for configuration
information.
Alcatel-Lucent recommends the following steps to achieving 5620 SAM workstation
security:
•
Install a clean operating system environment with the minimum required packages
documented in the
5620 SAM | 5650 CPAM Installation and Upgrade Guide
•
Install the latest Recommended Patch Cluster from Red Hat (available at
www.redhat.com)
•
If installing RHEL, disable the mDNS Service.
•
Implement firewall rules for 5620 SAM to control access to ports on 5620 SAM
platforms as described in
“5620 SAM and firewalls” (p. 7-4)
•
If installing RHEL, enable the RHEL firewall filter rules lists. See
for more details
•
Installation of 5620 SAM with a secure configuration described in
software installation” (p. 7-3)
•
Network Element connection configuration as described in
element communication” (p. 7-4)
•
If installing RHEL, configure 5620 SAM to run at runlevel 3 as opposed to the default
runlevel 5
Security
Securing 5620 SAM
....................................................................................................................................................................................................................................
....................................................................................................................................................................................................................................
7-2
5620 SAM
3HE-09809-AAAG-TQZZA 13.0 R7
Issue 1
December 2015