Network ports – HP Onboard Administrator User Manual

Page 22

Advertising
background image

Introduction 22

Securing the Insight Display LCD panel
The Insight Display LCD panel allows for configuration and monitoring of key Onboard Administrator
settings: network address configuration and power up/down of server blade bays to name a few

critical BladeSystem functions. HP recommends securing the Insight Display LCD panel with a PIN,
particularly in a multi-tenant datacenter. Furthermore, certain regulatory or industry standards, such as

PCI, might require that all interfaces be secured with a PIN/password, regardless of requiring physical

access.
The Insight Display LCD panel buttons are locked by default in FIPS Mode ON/DEBUG. For more
information, see "FIPS tab (on page

117

)."

Set factory defaults before hardware redeployment
The very nature of redundant hardware is to ensure that all settings are present so that if a failure occurs on

the Active Onboard Administrator, the Standby Onboard Administrator can take over the active role. This

means that local user account information is duplicated on the Standby Onboard Administrator. If Enclosure

IP mode is configured, then the private key used for SSL communications is also stored on the Standby
Onboard Administrator. (Enclosure IP mode is not configured by default.) Depending on the security

requirements for the datacenter, critical security parameters should be cleared from the hardware before

decommissioning or reprovisioning an enclosure or components inside the enclosure, such as the Onboard

Administrator, VC, and iLO for HP BladeSystem.
To ensure all critical security parameters are cleared, SET FACTORY defaults. Additionally, the Administrator

password can be set to factory “toe-tag” value by manually changing the password or connecting a serial

cable and invoking the lost password recovery procedure. For instructions, see "Recovering the administrator

password (on page

19

)."

Isolate the management network
No matter how secure a device might appear to be, there will always be some sort of new attack or

vulnerability. As a preventative measure and to follow industry best practices, HP strongly recommends that

the management network be separate from the production network. Furthermore, do not place the

management network on the open internet or firewall DMZ without requiring additional access
authentication, such as using a VPN/tunnel.

Network ports

For more information on ports, see "Access requirements (on page

10

)."

For more information on managing HP software through a firewall, see the Managing HP Servers Through

Firewalls with Insight Management White Paper. This document may be downloaded from the HP Insight

Management Information Library (

http://www.hp.com/go/docs

).

Default FIPS Mode settings compared to strong encryption

Beginning with version 3.70, Onboard Administrator significantly upgrades the Onboard Administrator

cryptographic capabilities by adding a new FIPS Mode of operation. FIPS Mode enforces a number of

requirements that differ significantly from the Enforce Strong Encryption setting in Onboard Administrator
version 3.60 and prior releases. As of version 3.70, the default security settings in Onboard Administrator

have been upgraded and are now equivalent to the version 3.60 Enforce Strong Encryption setting. The

security improvements remove weak algorithms for message authentication, default the SSL hash signature

algorithm to SHA-256, and support use of only FIPS 140-2 approved ciphers. For more information, see the
following table. A list of supported SSH ciphers, SSH key exchange algorithms, and SSH Message

Authentication Code algorithms follows the table.

Advertising