Table 1-2 iLO 2 MP Supported Browsers and Client Operating Systems

Browsers

 

Client Operating System

 

 

Java Plug-in 1.5.0_08

HP-UX

Windows

 

Linux

 

OpenVMS

 

11i

WS 2003

 

Red Hat

 

 

 

23/11.31

Enterprise

XP

Enterprise

SuSE

8.3

Firefox 2.0.0.4

X

X

X

X

X

 

Internet Explorer 6.0

 

X

X

 

 

 

HP Secure Web Browser 1.7.13

 

 

 

 

 

X

Related Links

Java for HP-UX

http://www.hp.com/products1/unix/java/versions/index.html

http://www.hp.com/products1/unix/java/archives/index.html

Java for OpenVMS

http://h18012.www1.hp.com/java/alpha

Firefox for HP-UX

http://www.hp.com/products1/unix/java/firefox/index.html Note: 1.5.0.00 needs patch

http://www.hp.com/go/firefox

Firefox for Linux

http://linuxcoe.corp.hp.com

Firefox for Windows and Linux

http://www.mozilla.com/firefox

Browser Support 1.5.0

http://java.sun.com/j2se/1.5.0/system-configurations.html

Operating Systems for Montvale

http://psweb1.cup.hp.com/~projects/sisl_prgm_mgmt/mvx%20(Low-end%20Montvale)/mvx%20info.htm

Security

It is important to have strong security surrounding the iLO 2 MP device. HP security requirements of the enterprise and architected the iLO 2 MP include the following:

Authentication

iLO 2 MP incorporates authentication techniques with the use of 128-bit

 

Secure Socket Layer (SSL) encryption. It is password based for web and

 

password- and key-based for secure shell (SSH).

Authorization

Using local accounts, iLO 2 MP enables you to define up to 19 separate

 

users and to vary the server access rights of each user. The directory

 

services capabilities of iLO 2 MP enables you to maintain network user

 

accounts and security policies in a central, scalable database that supports

 

thousands of users, devices, and management roles.

Integrity

iLO 2 MP incorporates a trusted Java™ applet for vMedia.

Privacy

iLO 2 MP uses SSL for web connections, RSL-RC4 encryption for integrated

 

remote console and remote serial console, and SSH-DES3/DES128 2.0

 

recommended encryption algorithms for SSH-based connections. You

 

can enable or disable telnet, IPMI over LAN, web, and SSH connectivity.

Login

After initial failed login attempts (default three), a delay of approximately

 

one second is imposed on the serial connection and the login banner

 

warnings are repeated. All other connection types are disconnected.

Security 25

Page 25
Image 25
HP Integrity iLO 2 MP 5991-6005 manual Security, Password- and key-based for secure shell SSH, Authorization, Login