135
iLO Security
In This Section
Security Features ........................................................................................................................135
General Security Guidelines.......................................................................................................135
Encryption ..................................................................................................................................136
iLO Security Override Switch Administration...........................................................................136
User Accounts ............................................................................................................................137
Password Guidelines...................................................................................................................139
Certificates..................................................................................................................................140
Securing RBSU ..........................................................................................................................141
•
Security Features
iLO provides the following security features:
User-defined TCP/IP ports ("Network Settings" on page 91
)
•
•
User actions logged in the iLO Event Log
Progressive delays for failed login attempts ("Login Security" on page 138
)
• Support for X.509 CA signed certificates (on page 140)
• Support for RBSU settings ("Global Security Settings" on page 139)
•
•
•
Support for optional LDAP-based directory services authentication and
authorization (requires iLO Advanced)
Encrypted communication using SSL and SSH.
General Security Guidelines
The following are general guidelines concerning security for iLO:
For maximum security, iLO should be set up on a separate management
network.