135

iLO Security

 

In This Section

 

Security Features ........................................................................................................................

135

General Security Guidelines.......................................................................................................

135

Encryption ..................................................................................................................................

136

iLO Security Override Switch Administration ...........................................................................

136

User Accounts ............................................................................................................................

137

Password Guidelines...................................................................................................................

139

Certificates..................................................................................................................................

140

Securing RBSU ..........................................................................................................................

141

Security Features

iLO provides the following security features:

User-defined TCP/IP ports ("Network Settings" on page 91)

User actions logged in the iLO Event Log

Progressive delays for failed login attempts ("Login Security" on page 138)

Support for X.509 CA signed certificates (on page 140)

Support for RBSU settings ("Global Security Settings" on page 139)

Support for optional LDAP-based directory services authentication and authorization (requires iLO Advanced)

Encrypted communication using SSL and SSH.

General Security Guidelines

The following are general guidelines concerning security for iLO:

For maximum security, iLO should be set up on a separate management network.