General security guidelines, Passwords, Ilo rbsu and ilo 4 configuration utility security – HP Integrated Lights-Out 4 User Manual
Page 61

•
Encrypted communication that uses SSL certificate administration. For more information, see
“Administering SSL certificates” (page 67)
•
Support for optional LDAP-based directory services. For more information, see
.
Some of these options are licensed features. For more information, see
General security guidelines
General security guidelines for iLO follow:
•
For maximum security, configure iLO on a separate management network. For more information,
see
“Connecting iLO to the network” (page 19)
•
Do not connect iLO directly to the Internet.
•
Use a browser that has a 128-bit cipher strength.
Passwords
HP recommends that you follow these password guidelines:
•
Passwords should:
Never be written down or recorded
◦
◦
Never be shared with others
◦
Not be words found in a dictionary
◦
Not be obvious words, such as the company name, product name, user name, or login
name
•
Passwords should have at least three of the following characteristics:
One numeric character
◦
◦
One special character
◦
One lowercase character
◦
One uppercase character
Depending on the Minimum Password Length setting on the Access Settings page, the password
can have a minimum of zero characters (no password) and a maximum of 39 characters. The
default Minimum Password Length is eight characters.
IMPORTANT:
HP does not recommend setting the Minimum Password Length to fewer than eight
characters unless you have a physically secure management network that does not extend outside
the secure data center. For information about setting the Minimum Password Length, see
“Configuring access options” (page 57)
iLO RBSU and iLO 4 Configuration Utility security
iLO RBSU and the iLO 4 Configuration Utility enable you to view and modify the iLO configuration.
You can configure iLO RBSU and iLO Configuration Utility access settings by using iLO RBSU, the
iLO 4 Configuration Utility, a web browser, RIBCL scripts, or the iLO Security Override Switch.
•
For information about using a web browser to configure iLO RBSU or iLO 4 Configuration
Utility access settings, see
“Configuring access options” (page 57)
.
•
For information about using iLO RBSU or iLO 4 Configuration Utility to configure iLO RBSU
or iLO 4 Configuration Utility access settings, see
“Configuring iLO by using the ROM-based
.
Configuring iLO security
61