HP iLO 4 User Guide

Encrypted communication that uses SSL certificate administration. For more information, see
Administering SSL certificates” (page 67).
Support for optional LDAP-based directory services. For more information, see “Directory
services” (page 250).
Some of these options are licensed features. For more information, see “iLO licensing” (page 43).
General security guidelines
General security guidelines for iLO follow:
For maximum security, configure iLO on a separate management network. For more information,
see “Connecting iLO to the network” (page 19).
Do not connect iLO directly to the Internet.
Use a browser that has a 128-bit cipher strength.
Passwords
HP recommends that you follow these password guidelines:
Passwords should:
Never be written down or recorded
Never be shared with others
Not be words found in a dictionary
Not be obvious words, such as the company name, product name, user name, or login
name
Passwords should have at least three of the following characteristics:
One numeric character
One special character
One lowercase character
One uppercase character
Depending on the Minimum Password Length setting on the Access Settings page, the password
can have a minimum of zero characters (no password) and a maximum of 39 characters. The
default Minimum Password Length is eight characters.
IMPORTANT: HP does not recommend setting the Minimum Password Length to fewer than eight
characters unless you have a physically secure management network that does not extend outside
the secure data center. For information about setting the Minimum Password Length, see
“Configuring access options” (page 57).
iLO RBSU and iLO 4 Configuration Utility security
iLO RBSU and the iLO 4 Configuration Utility enable you to view and modify the iLO configuration.
You can configure iLO RBSU and iLO Configuration Utility access settings by using iLO RBSU, the
iLO 4 Configuration Utility, a web browser, RIBCL scripts, or the iLO Security Override Switch.
For information about using a web browser to configure iLO RBSU or iLO 4 Configuration
Utility access settings, see “Configuring access options” (page 57).
For information about using iLO RBSU or iLO 4 Configuration Utility to configure iLO RBSU
or iLO 4 Configuration Utility access settings, see “Configuring iLO by using the ROM-based
utilities” (page 132).
Configuring iLO security 61