iLO security
Security features..................................................................................................................................... 53
General security guidelines ..................................................................................................................... 53
Securing RBSU....................................................................................................................................... 55
Encryption ............................................................................................................................................. 56
Remote Console Computer Lock ............................................................................................................... 56
User accounts ........................................................................................................................................ 57
Two-factor authentication ........................................................................................................................ 58
Directory settings.................................................................................................................................... 63
Security features
iLO provides the following security features:
User-defined TCP/IP ports
User actions logged in the iLO Event Log
Progressive delays for failed login attempts
Support for X.509 CA signed certificates (on page 54)
Support for RBSU settings
Support for optional LDAP-based directory services authentication and authorization (requires iLO
Advanced)
Encrypted communication using SSL and SSH.
General security guidelines
The following are general guidelines concerning security for iLO:
For maximum security, iLO should be set up on a separate management network.
iLO should not be connected directly to the Internet.
A 128-bit cipher strength browser must be used.
Password guidelines
The following is a list of recommended password guidelines. Passwords should:
Never be written down or recorded
Never be shared with others
Not be words generally found in a dictionary, or easy to guess words, such as the company name,
product names, the user's name, or the user's User ID
("Network
settings" on page 26)
("Login
("Securing
RBSU" on page 55)
security" on page 58)
iLO security 53