EasyManua.ls Logo

Hitachi Compute Blade 500 Series - Security Strength

Hitachi Compute Blade 500 Series
362 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Feature
Supported
protocol
Default
port
No.
Cipher-
text or
cleartext
Service
disabled
Restriction
on IP
address
Changing
port
number
Remote
console
Hitachi
protocol
5001 cipher Y Y Y
SMASH (CLP)
SSHv2
2
22 cipher Y Y Y
SMASH (WS-
Management)
WS-MAN 5986 cipher Y Y Y
Syslog transfer SYSLOG 514 cipher/
clear
4
Y - Y
LDAP
authentication
LDAP
(StartTLS)
389
3
cipher Y - Y
Legend:
Y: Configurable Blank: Not configurable
Notes:
1. HTTP is used for some communications with firmware version 04-21 or earlier of
server blades: CB 520H A1/B1/B2, CB 520A A1, CB 540A A1/B1.
2. Connection with SSHv1 is not supported.
3. Port number for the LDAP server. Connection with LDAPS is not supported.
4. You can select ciphertext or cleartext by setting.
Security strength
Security strength can be increased in management interfaces for
management modules and BMC. Security strength includes "default" and
"high", and the factory setting is "default" at shipping. Security strength
"high" has the following restrictions.
•
When cipher-text communication is available, clear-text communication is
not allowed.
• For cipher-text communication, encryption algorithm with high security
can be used.
See
Security strength and features on page 2-31 for details.
Table 2-35 Web console operation
Item Operation
Displaying Security strength for
management modules and BMC
Resources tab > Systems > Security strength
setting > Security strength tab
Setting Security strength for
management modules and BMC
Resources tab > Systems > Security strength
setting > Security strength tab > Edit
Functional detail
2-29
Hitachi Compute Blade 500 Series Management Module Setup Guide

Table of Contents

Other manuals for Hitachi Compute Blade 500 Series

Related product manuals