HP Integrated Lights-Out Security, 7th edition

HP Integrated Lights-Out security
Technology brief, 7
th
Edition
Introduction ......................................................................................................................................... 2
Protected access to iLO and sensitive information .................................................................................... 2
iLO resistance against phlashing ........................................................................................................ 2
Security keys ................................................................................................................................... 3
Physical security ............................................................................................................................... 3
Security in hardware design.................................................................................................................. 4
Management ROM .......................................................................................................................... 4
Firewall logic ................................................................................................................................... 5
Memory .......................................................................................................................................... 5
Non-volatile data storage .................................................................................................................. 5
Network and management ports ........................................................................................................ 6
Security techniques used by iLO ............................................................................................................ 7
Authentication and authorization processes for browser access ............................................................. 7
Authentication and authorization processes for CLI access .................................................................. 18
Authentication process for IPMI-Over-LAN access ............................................................................... 19
Encryption ..................................................................................................................................... 19
Disabling and changing ports .......................................................................................................... 21
Connectivity between iLO, the server, and the network ........................................................................... 22
Network access to iLO .................................................................................................................... 22
Physical access to iLO .................................................................................................................... 25
Access to the server from iLO .......................................................................................................... 25
iLO software on server using the PCI bus ........................................................................................... 25
IT infrastructure security considerations ................................................................................................. 26
Operating iLO servers in the DMZ .................................................................................................... 26
Communication between iLO and server blades ................................................................................ 28
Security audits ............................................................................................................................... 28
General security recommendations ...................................................................................................... 29
Conclusion ........................................................................................................................................ 29
Appendix: SSH-2 support ................................................................................................................... 30
For more information .......................................................................................................................... 32
Call to action .................................................................................................................................... 32

Summary of content (32 pages)