Logging in to ilo by using an ssh client, Configuring ilo security, General security guidelines – HP Integrated Lights-Out 3 User Manual

Page 43

Advertising
background image

Logging in to iLO by using an SSH client

When a user logs in to iLO by using an SSH client, the number of login name and password
prompts displayed by iLO matches the value of the Authentication Failure Logging option (3 if it is
disabled). The number of prompts might also be affected by your SSH client configuration. SSH
clients also implement delays after login failure.

For example, to generate an SSH authentication failure log with the default value (Enabled-Every
3rd Failure), assuming that the SSH client is configured with the number of password prompts set
to 3, three consecutive login failures occur as follows:
1.

Run the SSH client and log in with an incorrect login name and password.

You receive three password prompts. After the third incorrect password, the connection ends
and the first login failure is recorded. The SSH login failure counter is set to 1.

2.

Run the SSH client and log in with an incorrect login name and password.

You receive three password prompts. After the third incorrect password, the connection ends
and the second login failure is recorded. The SSH login failure counter is set to 2.

3.

Run the SSH client and log in with an incorrect login name and password.

You receive three password prompts. After the third incorrect password, the connection ends
and the third login failure is recorded. The SSH login failure counter is set to 3.

The iLO firmware records an SSH failed login log entry, and sets the SSH login failure counter to
0.

Configuring iLO security

iLO provides the following security features:

User-defined TCP/IP ports. For more information, see

“Configuring iLO access settings”

(page 39)

.

User actions logged in the iLO Event Log. For more information, see

“Using the iLO Event Log”

(page 106)

.

Progressive delays for failed login attempts. For more information, see

“Login security”

(page 46)

.

Support for X.509 CA signed certificates. For more information, see

“Administering SSL

certificates” (page 48)

.

Support for securing iLO RBSU. For more information, see

“iLO RBSU security” (page 44)

.

Encrypted communication that uses SSL certificate administration. For more information, see

“Administering SSL certificates” (page 48)

.

Support for optional LDAP-based directory services. For more information, see

“Directory

services” (page 160)

.

Some of these options are licensed features. For more information, see

“iLO licensing” (page 31)

.

General security guidelines

General security guidelines for iLO follow:

For maximum security, configure iLO on a separate management network. For more information,
see

“Connecting iLO to the network” (page 16)

.

Do not connect iLO directly to the Internet.

Use a browser that has a 128-bit cipher strength.

Configuring iLO security

43

Advertising