EasyManua.ls Logo

HP ntegrity iLO 2 MP

HP ntegrity iLO 2 MP
199 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table 1-2 iLO 2 MP Supported Browsers and Client Operating Systems
Client Operating SystemBrowsers
OpenVMSLinuxWindowsHP-UXJava Plug-in 1.5.0_08
8.3SuSE
Red Hat
EnterpriseXP
WS 2003
Enterprise
11i
23/11.31
XXXXXFirefox 2.0.0.4
XXInternet Explorer 6.0
XHP Secure Web Browser 1.7.13
Related Links
Java for HP-UX
http://www.hp.com/products1/unix/java/versions/index.html
http://www.hp.com/products1/unix/java/archives/index.html
Java for OpenVMS
http://h18012.www1.hp.com/java/alpha
Firefox for HP-UX
http://www.hp.com/products1/unix/java/firefox/index.html
Note: 1.5.0.00 needs patch
http://www.hp.com/go/firefox
Firefox for Linux
http://linuxcoe.corp.hp.com
Firefox for Windows and Linux
http://www.mozilla.com/firefox
Browser Support 1.5.0
http://java.sun.com/j2se/1.5.0/system-configurations.html
Operating Systems for Montvale
http://psweb1.cup.hp.com/~projects/sisl_prgm_mgmt/mvx%20(Low-end%20Montvale)/mvx%20info.htm
Security
It is important to have strong security surrounding the iLO 2 MP device. HP security requirements
of the enterprise and architected the iLO 2 MP include the following:
Authentication iLO 2 MP incorporates authentication techniques with the use of 128-bit
Secure Socket Layer (SSL) encryption. It is password based for web and
password- and key-based for secure shell (SSH).
Authorization Using local accounts, iLO 2 MP enables you to define up to 19 separate
users and to vary the server access rights of each user. The directory
services capabilities of iLO 2 MP enables you to maintain network user
accounts and security policies in a central, scalable database that supports
thousands of users, devices, and management roles.
Integrity iLO 2 MP incorporates a trusted Java™ applet for vMedia.
Privacy iLO 2 MP uses SSL for web connections, RSL-RC4 encryption for integrated
remote console and remote serial console, and SSH-DES3/DES128 2.0
recommended encryption algorithms for SSH-based connections. You
can enable or disable telnet, IPMI over LAN, web, and SSH connectivity.
Login After initial failed login attempts (default three), a delay of approximately
one second is imposed on the serial connection and the login banner
warnings are repeated. All other connection types are disconnected.
Security 25

Table of Contents

Related product manuals