Users Guide

Configuring and Using the DRAC 5 Command Line Console 77
The DRAC 5 SSH implementation supports multiple cryptography schemes,
as shown in Table 3-6.
NOTE: SSHv1 is not supported.
Enabling Additional DRAC 5 Security Options
To prevent unauthorized access to your remote system, the DRAC 5 provides
the following features:
IP address filtering (IPRange) — Defines a specific range of IP addresses
that can access the DRAC 5.
IP address blocking — Limits the number of failed login attempts from a
specific IP address
Table 3-6. Cryptography Schemes
Scheme Type Scheme
Asymmetric Cryptography Diffie-Hellman DSA/DSS 512-1024 (random) bits
per NIST specification
Symmetric Cryptography
AES256-CBC
•RIJNDAEL256-CBC
AES192-CBC
•RIJNDAEL192-CBC
AES128-CBC
•RIJNDAEL128-CBC
BLOWFISH-128-CBC
3DES-192-CBC
•ARCFOUR-128
Message Integrity
•HMAC-SHA1-160
•HMAC-SHA1-96
HMAC-MD5-128
HMAC-MD5-96
Authentication
•Password