White Papers

PAGE 2 OF 17
Table of Contents
TERMINOLOGY...........................................................................................................................................................3
INTRODUCTION..........................................................................................................................................................5
AUTHENTICATION AND AUTHORIZATION ............................................................................................................6
LOGIN USING LOCAL ACCOUNT...................................................................................................................................6
RAC Login User Privilege ....................................................................................................................................6
RAC Card Configuration Privilege.......................................................................................................................6
RAC User Configuration Privilege .......................................................................................................................6
RAC Log Clear Privilege ......................................................................................................................................7
RAC Server Reset and Power-On/Off Privilege .................................................................................................7
RAC Console Redirection Privilege.....................................................................................................................7
RAC Virtual Media Privilege.................................................................................................................................7
RAC Test Alert Privilege ......................................................................................................................................7
RAC Debug Command Privilege.........................................................................................................................7
LOGIN USING ACTIVE DIRECTORY WITH DELL SCHEMA EXTENSION ............................................................................7
LOGIN USING ACTIVE DIRECTORY WITHOUT DELL SCHEMA EXTENSION......................................................................9
Encryption ...........................................................................................................................................................11
SSL CERTIFICATE MANAGEMENT .............................................................................................................................11
SUPPORTED SSL CIPHER SUITES.............................................................................................................................11
SECURE SHELL ENCRYPTION....................................................................................................................................11
EVENT LOGGING .....................................................................................................................................................12
LOG FORMAT ............................................................................................................................................................12
LOG EVENTS.............................................................................................................................................................12
DISABLING SERVICES AND CHANGING SERVICE PORT NUMBER ................................................................................12
WEB BROWSER SECURITY........................................................................................................................................14
REMOTE CLI SECURITY ............................................................................................................................................14
LOCAL CLI SECURITY ...............................................................................................................................................14
SSH SECURITY ........................................................................................................................................................15
SNMP Security ...................................................................................................................................................15
Virtual Media Security ........................................................................................................................................15
CONSOLE REDIRECTION SECURITY...........................................................................................................................16
Authentication and Encryption...........................................................................................................................16
User Session Privacy .........................................................................................................................................17