Insight Remote Support 7.0.9 Security White Paper
2
Event Filtering .......................................................................................................................................................................... 18
Entitlement ............................................................................................................................................................................... 18
Event Correlation .................................................................................................................................................................... 18
Figure 4: Configuration Collection Data Flow at HP..................................................................................................... 19
Collection Processing ............................................................................................................................................................. 19
HP Insight Online ......................................................................................................................................................................... 20
HP Support Center .................................................................................................................................................................. 20
HP Passport .............................................................................................................................................................................. 20
Remote Device Access (RDA) .................................................................................................................................................... 21
Ad Hoc ........................................................................................................................................................................................ 21
Entitled ...................................................................................................................................................................................... 21
Service Value ............................................................................................................................................................................ 21
Authentication ......................................................................................................................................................................... 22
Access Control Overview ....................................................................................................................................................... 22
Secure Communications ........................................................................................................................................................ 22
Remote Device Access Using SSH ....................................................................................................................................... 22
Customer Access System (CAS) ........................................................................................................................................... 22
Customer-owned CAS ............................................................................................................................................................ 22
Virtual CAS ................................................................................................................................................................................ 23
Figure 5: Virtual CAS ........................................................................................................................................................... 24
HP Instant Customer Access Server (iCAS) ........................................................................................................................ 24
Figure 6: Instant CAS (iCAS) ............................................................................................................................................... 25
RDA Access Controls ................................................................................................................................................................... 26
Access Controls at HP ............................................................................................................................................................ 26
Figure 7: Remote Access Connection System Details ................................................................................................. 27
Access Controls Onsite .......................................................................................................................................................... 27
Connectivity Method: SSH-Direct – Secure Shell over Internet ..................................................................................... 28
Figure 8: SSH Direct ............................................................................................................................................................ 28
Connectivity Methods for VPN Solutions ........................................................................................................................... 28
Figure 9: General IPSec VPN Access with SSH .............................................................................................................. 29
Figure 10: General IPSec VPN Access Without SSH ..................................................................................................... 30
IPSec VPN .................................................................................................................................................................................. 30
Connectivity Method for Integrated Service Digital Network (ISDN) ............................................................................ 30
Figure 11: ISDN .................................................................................................................................................................... 31
Attended RDA via Virtual Support Room ........................................................................................................................... 31
Figure 12: Virtual Support Room Architecture ............................................................................................................. 32
Data Privacy ............................................................................................................................................................................. 32
Outbound Security .................................................................................................................................................................. 32
Inbound Security ..................................................................................................................................................................... 33
Security Auditing ..................................................................................................................................................................... 33
GLOSSARY of Terms ................................................................................................................................................................... 34
Appendix A: Summary of Network Ports for Standard Operating System Connectivity ............................................. 34