General security guidelines, Passwords, Ilo rbsu and ilo 4 configuration utility security – HP Integrated Lights-Out 4 User Manual

Page 61

Advertising
background image

Encrypted communication that uses SSL certificate administration. For more information, see

“Administering SSL certificates” (page 67)

.

Support for optional LDAP-based directory services. For more information, see

“Directory

services” (page 250)

.

Some of these options are licensed features. For more information, see

“iLO licensing” (page 43)

.

General security guidelines

General security guidelines for iLO follow:

For maximum security, configure iLO on a separate management network. For more information,
see

“Connecting iLO to the network” (page 19)

.

Do not connect iLO directly to the Internet.

Use a browser that has a 128-bit cipher strength.

Passwords

HP recommends that you follow these password guidelines:

Passwords should:

Never be written down or recorded

Never be shared with others

Not be words found in a dictionary

Not be obvious words, such as the company name, product name, user name, or login
name

Passwords should have at least three of the following characteristics:

One numeric character

One special character

One lowercase character

One uppercase character

Depending on the Minimum Password Length setting on the Access Settings page, the password
can have a minimum of zero characters (no password) and a maximum of 39 characters. The
default Minimum Password Length is eight characters.

IMPORTANT:

HP does not recommend setting the Minimum Password Length to fewer than eight

characters unless you have a physically secure management network that does not extend outside
the secure data center. For information about setting the Minimum Password Length, see

“Configuring access options” (page 57)

.

iLO RBSU and iLO 4 Configuration Utility security

iLO RBSU and the iLO 4 Configuration Utility enable you to view and modify the iLO configuration.
You can configure iLO RBSU and iLO Configuration Utility access settings by using iLO RBSU, the
iLO 4 Configuration Utility, a web browser, RIBCL scripts, or the iLO Security Override Switch.

For information about using a web browser to configure iLO RBSU or iLO 4 Configuration
Utility access settings, see

“Configuring access options” (page 57)

.

For information about using iLO RBSU or iLO 4 Configuration Utility to configure iLO RBSU
or iLO 4 Configuration Utility access settings, see

“Configuring iLO by using the ROM-based

utilities” (page 132)

.

Configuring iLO security

61

Advertising