HP Insight Software 6.0 Getting Started Guide
• HP Insight Control power management
• HP Insight Control server deployment
• HP Insight Control server deployment 6.n patch
• HP Insight Control server migration
• HP Insight mxsync utility
• HP Insight Control virtual machine management
• HP Insight managed system setup wizard
• HP Insight Software Advisor
• HP Virtual Connect Enterprise Manager software
Advanced management software
The HP Insight Dynamics advanced infrastructure management software products are delivered on Insight
Software DVD #2 or in ISO #2:
• HP Insight Dynamics capacity planning, configuration and workload management and HP Insight
Capacity Advisor Consolidation software
• HP Insight Dynamics recovery management
• HP Insight Dynamics infrastructure orchestration
Recommendations for security policies and practices
The Insight software solution is designed for deployment in an Intranet environment.
HP has published a white paper entitled "
Understanding HP SIM 5.x security
" that describes communications
between entities that help you design and configure your environment to ensure the maximum level of security,
including deciding where firewalls are needed and which ports must remain open for management traffic.
The white paper is available at the following website:
http://h10018.www1.hp.com/wwsolutions/misc/hpsim-helpfiles/HPSIM_53_Security.pdf
Most security policies and practices in a traditional environment are applicable in a virtualized environment.
However, in a virtualized environment, these policies might require modifications and additions.
The following security practices are recommended by HP in a virtualized environment. This is only a partial
list because differing security policies and implementation practices make it difficult to provide a complete
and definitive list. However,these recommendations are a good starting point:
• Use a separate management network. For security and performance reasons, HP recommends:
Establishing a private management network separate from the data network•
• Granting access to the management network only to administrators
• Using a firewall to restrict traffic into the management network
• Eliminate or disable non-essential services. Configure all host systems, management systems, and
network devices so that non-essential services are either eliminated or disabled, including networking
ports when not in use. This can significantly reduce the number of attack vectors in your environment.
• Ensure that a process is in place to periodically check for and install patches for all components in your
environment.
• Address the use of virtualization in your corporate security policy and processes. For example:
Educate administrators about changes to their roles and responsibilities in a virtual environment.•
• If an Intrusion Detection System (IDS) is being used in your environment, ensure that the IDS solution
has visibility into network traffic in the virtual switch (within a hypervisor).
• Mitigate potential sniffing of VLAN traffic by turning off promiscuous mode in the hypervisor and
by encrypting traffic flowing over the VLAN.
8 Introduction to HP Insight software