Oracle FAQ Your Portal to the Oracle Knowledge Grid
HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US
 

Home -> Community -> Usenet -> c.d.o.server -> Re: Security and Oracle

Re: Security and Oracle

From: Thomas Kyte <tkyte_at_us.oracle.com>
Date: 1997/07/24
Message-ID: <33d88d06.12121870@newshost>#1/1

On 24 Jul 1997 13:22:44 GMT, "Helmut Hahn" <helmut.hahn_at_bitoek.uni-bayreuth.de> wrote:

>Hi
>
>Is it possible to configure the listener to listen only for specified
>IP-Adresses, or can I deny permission for IP-Adresses. Any tips or hints
>would be great!
>
>Helmut

You set this up in the protocol.ora file. It is called valid node checking:

<quote>
The objective of Validnode verification is to restrict connection access of network clients to those with enabling host privilege. The access list is in the PROTOCOL.ORA file. The list is dynamic and used by the Validnode component to decide on granting access to incoming connection requests.

....
The access list for Validnode checking can take two forms: an INVITED_NODES list and an EXCLUDED_NODES list. The two lists are mutually exclusive. If both are present, the INVITED_NODES list takes precedence over the EXCLUDED_NODES list.

</quote>

See the "Understanding SQL*Net" doc for more info on setting up the protocol.ora file...

Thomas Kyte
tkyte_at_us.oracle.com
Oracle Government
Bethesda MD

http://govt.us.oracle.com/ -- downloadable utilities



Opinions are mine and do not necessarily reflect those of Oracle Corporation Received on Thu Jul 24 1997 - 00:00:00 CDT

Original text of this message

HOME | ASK QUESTION | ADD INFO | SEARCH | E-MAIL US