HP ProLiant Integrated Lights-Out 2 v 2.00 User Guide

Configuring iLO 2 43
Security
iLO 2 enables you to customize iLO 2 security settings. To access iLO 2 security settings, select
Administration>Security. iLO 2 security options include
SSH key administration (on page 46)
SSL certificate administration (on page 47)
Two-factor authentication (on page 48)
Directory settings (on page 53)
iLO 2 encryption
HP SIM single sign-on ("HP SIM single sign-on (SSO)" on page 57)
Remote Console Computer Lock (on page 60)
iLO 2 security options enables iLO 2 to provide the following security features:
User-defined TCP/IP ports
User actions logged in the iLO 2 Event Log
Progressive delays for failed login attempts
Support for X.509 CA signed certificates
Support for securing RBSU
Encrypted communication using:
o SSH key administration
o SSL certificate administration
Support for optional LDAP-based directory services
Some of these options are licensed features. To verify your available options, see the section, "Licensing
(on page 25)."
General security guidelines
The following are general guidelines concerning security for iLO 2:
For maximum security, iLO 2 should be set up on a separate management network.
iLO 2 should not be connected directly to the Internet.
A 128-bit cipher strength browser must be used.
Password guidelines
The following is a list of recommended password guidelines. Passwords should:
Never be written down or recorded
Never be shared with others
Not be words generally found in a dictionary, or easy to guess words, such as the company name,
product names, the user's name, or the user's User ID
Include at least three of the four following characteristics: