Planning and configuration recommendations
for Integrated Lights-Out processors
technology brief, 2
nd
Abstract.............................................................................................................................................. 3
Introduction......................................................................................................................................... 3
IT environment assessment .................................................................................................................... 3
Private management network............................................................................................................. 4
iLO configuration................................................................................................................................. 9
Single iLO device............................................................................................................................. 9
Multiple iLO devices ......................................................................................................................... 9
iLO network settings ....................................................................................................................... 10
HP default schema method .............................................................................................................. 14
HP extended schema method........................................................................................................... 15
edition
iLO common network .................................................................................................................... 5
iLO Shared Network Port .............................................................................................................. 5
Automated setup .......................................................................................................................... 9
Initial deployment ....................................................................................................................... 10
Naming conventions ................................................................................................................... 10
Proxy servers ............................................................................................................................. 10
Support for nested groups ........................................................................................................... 15
Required Software ...................................................................................................................... 15
Roles......................................................................................................................................... 16
Two-factor authentication............................................................................................................. 19