User's Guide (1.1)

Chapter 3: Software Application and Usage
3-31
2
3
4
5
6
7
8
9
12
11
1
13
1
'HYLFH6HWWLQJV&HUWL¿FDWH
G&HUWL¿FDWH
10
G&HUWL¿FDWH
&HUWL¿FDWH&OLFNRQWKLVIXQFWLRQNH\WRDFWLYDWHLWVVXEPHQXDQGFRQ¿JXUHWKH
IROORZLQJ&HUWL¿FDWHVHWWLQJVDVOLVWHGEHORZ
&HUWL¿FDWH6LJQLQJ5HTXHVW&657KLVZLQGRZDOORZV\RXWRGH¿QHWKH&HU-
WL¿FDWH6LJQLQJ5HTXHVW&65IRUP7KH,30,XVHVWKH6HFXUH6RFNHW/D\HU66/
SURWRFRO IRU HQFU\SWHG QHWZRUN WUDI¿F EHWZHHQ LWVHOI DQG WKH UHPRWH KRVW VHUYHUV
When a connection is made, the IPMI has to expose its identity to a remote host by
XVLQJDFU\SWRJUDSKLFFHUWL¿FDWH
Note: SHA1 and RSA 2048 bit SSL supported.
7RFUHDWHDFHUWL¿FDWHWKDWLVXQLTXHWRDSDUWLFXODU,30,FDUGRU6,0/&6,0/&FDUG
DFHUWL¿FDWLRQDXWKRULW\&$QHHGVWR¿OORXWWKH&65IRUPLQGLFDWHGLQWKH&65ZLQ-
GRZDERYHDQGFOLFN&UHDWHWRJHQHUDWHLW