iLO Security
........................................................................................................................135
..................................................................................................................................136
............................................................................................................................137
Guidelines...................................................................................................................139
Certificates..................................................................................................................................140
..........................................................................................................................141
Security Features
iLO provides the following security features:
General Security Guidelines
The following are general guidelines concerning security for iLO:
.......................................................................................................135
User-defined TCP/IP ports ("Network Settings" on page 91)
User actions logged in the iLO Event Log
Progressive delays for failed login attempts ("Login Security" on page 138)
Support for X.509 CA signed certificates (on page 140)
Support for RBSU settings ("Global Security Settings" on page 139)
Support for optional LDAP-based directory services authentication and
authorization (requires iLO Advanced)
Encrypted communication using SSL and SSH.
For maximum security, iLO should be set up on a separate management
network.
...........................................................................136
135