White Papers

PAGE 2 OF 24
Table of Contents
TERMINOLOGY......................................................................................................................................................................................................4
INTRODUCTION.....................................................................................................................................................................................................6
AUTHENTICATION AND AUTHORIZATION.......................................................................................................................................................7
L
OG IN VIA
L
OCAL
A
CCOUNT
..................................................................................................................................................................................7
RAC Login User Privilege..............................................................................................................................................................................8
RAC Card Configuration Privilege ................................................................................................................................................................8
RAC User Configuration Privilege.................................................................................................................................................................8
RAC Log Clear Privilege................................................................................................................................................................................8
RAC Server Reset and Power-on/off Privilege............................................................................................................................................8
RAC Console Redirection Privilege..............................................................................................................................................................8
RAC Virtual Media Privilege..........................................................................................................................................................................8
RAC Test Alert Privilege................................................................................................................................................................................8
RAC Debug Command Privilege..................................................................................................................................................................8
L
OG IN VIA
A
CTIVE
D
IRECTORY
W
ITH
D
ELL
S
CHEMA
E
XTENSION
..........................................................................................................................8
L
OG IN VIA
A
CTIVE
D
IRECTORY
W
ITHOUT
D
ELL
S
CHEMA
E
XTENSION
..................................................................................................................10
ENCRYPTION.......................................................................................................................................................................................................12
SSL
C
ERTIFICATE
M
ANAGEMENT
........................................................................................................................................................................12
S
UPPORTED
SSL
C
IPHER
S
UITES
.......................................................................................................................................................................12
S
ECURE
S
HELL
E
NCRYPTION
..............................................................................................................................................................................13
IPMI
RMCP+
E
NCRYPTION
................................................................................................................................................................................13
EVENT LOGGING.................................................................................................................................................................................................14
L
OG
F
ORMAT
......................................................................................................................................................................................................14
L
OG
E
VENTS
.......................................................................................................................................................................................................14
ACCESS TO DRAC 5...........................................................................................................................................................................................15
D
ISABLING
S
ERVICES AND
C
HANGING THE
S
ERVICE
P
ORT
N
UMBER
....................................................................................................................15
S
ECURITY
P
OLICY
...............................................................................................................................................................................................17
IP Blocking....................................................................................................................................................................................................17
Invalid Login Attack Blocking.......................................................................................................................................................................17
SHARED NIC SECURITY....................................................................................................................................................................................19
W
EB
B
ROWSER
S
ECURITY
..................................................................................................................................................................................20
R
EMOTE
CLI
S
ECURITY
......................................................................................................................................................................................20
L
OCAL
CLI
S
ECURITY
..........................................................................................................................................................................................20
SSH
S
ECURITY
...................................................................................................................................................................................................20
SNMP
S
ECURITY
................................................................................................................................................................................................21
V
IRTUAL
M
EDIA
S
ECURITY
..................................................................................................................................................................................21