HP Xw460c HP Integrated Lights-Out 2 User Guide for Firmware 1.75 and 1.77 - Page 41

iLO 2 Remote Console and Remote Serial Console access, Security

Page 41 highlights

When logging in to iLO 2 with Telnet or SSH clients, the number of login name and password prompts offered by iLO 2 matches the value of the Authentication Failure Logging parameter (or 3 when it is disabled.) However, the number of prompts might also be affected by your Telnet and SSH client configurations. Telnet and SSH logins also implement delays after login failure. During the delay, login is disabled so no login failure occurs. As an example, to generate an SSH authentication failure log with a default value (for instance, Enabled-Every 3rd Failure), three consecutive login failures occur as follows (assuming the SSH client is configured with the number of password prompts >= 3): 1. Run the SSH client and log in with an incorrect login name and password. You will receive three password prompts. After the third incorrect password, the connection terminates, and the first login failure is recorded. The SSH login failure counter is set to 1. 2. Run the SSH client until receiving the login prompt. Log in with an incorrect login name and password. You will receive three password prompts. After the third incorrect password, the connection terminates, and the second login failure is recorded. The SSH login failure counter is set to 2. 3. Run the SSH client until receiving the login prompt. Log in with an incorrect login name and password. You will receive three password prompts. After the third incorrect password, the connection terminates and the third login failure is recorded. The SSH login failure counter is set to 3. At this point, iLO 2 firmware records an SSH login failure log entry and sets the SSH login failure counter to 0. iLO 2 Remote Console and Remote Serial Console access For iLO 2 Remote Console recommended client settings, server settings, optimizing mouse support, and Remote Serial Console settings, see the section, "iLO 2 Remote Console (on page 83)." Security iLO 2 enables you to customize iLO 2 security settings. To access iLO 2 security settings, select Administration>Security. iLO 2 security options include • SSH key administration (on page 45) • SSL certificate administration (on page 45) • Two-factor authentication (on page 46) • Directory settings (on page 51) • iLO 2 encryption • HP SIM single sign-on ("HP SIM single sign-on (SSO)" on page 56) • Remote Console Computer Lock (on page 59) iLO 2 security options enables iLO 2 to provide the following security features: • User-defined TCP/IP ports • User actions logged in the iLO 2 Event Log • Progressive delays for failed login attempts • Support for X.509 CA signed certificates • Support for securing RBSU Configuring iLO 2 41

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235

Configuring iLO 2 41
When logging in to iLO 2 with Telnet or SSH clients, the number of login name and password prompts
offered by iLO 2 matches the value of the Authentication Failure Logging parameter (or 3 when it is
disabled.) However, the number of prompts might also be affected by your Telnet and SSH client
configurations. Telnet and SSH logins also implement delays after login failure. During the delay, login is
disabled so no login failure occurs. As an example, to generate an SSH authentication failure log with a
default value (for instance, Enabled-Every 3rd Failure), three consecutive login failures occur as follows
(assuming the SSH client is configured with the number of password prompts >= 3):
1.
Run the SSH client and log in with an incorrect login name and password. You will receive three
password prompts. After the third incorrect password, the connection terminates, and the first login
failure is recorded. The SSH login failure counter is set to 1.
2.
Run the SSH client until receiving the login prompt. Log in with an incorrect login name and
password. You will receive three password prompts. After the third incorrect password, the
connection terminates, and the second login failure is recorded. The SSH login failure counter is set
to 2.
3.
Run the SSH client until receiving the login prompt. Log in with an incorrect login name and
password. You will receive three password prompts. After the third incorrect password, the
connection terminates and the third login failure is recorded. The SSH login failure counter is set to
3.
At this point, iLO 2 firmware records an SSH login failure log entry and sets the SSH login failure counter
to 0.
iLO 2 Remote Console and Remote Serial Console access
For iLO 2 Remote Console recommended client settings, server settings, optimizing mouse support, and
Remote Serial Console settings, see the section, "iLO 2 Remote Console (on page
83
)."
Security
iLO 2 enables you to customize iLO 2 security settings. To access iLO 2 security settings, select
Administration>Security.
iLO 2 security options include
SSH key administration (on page
45
)
SSL certificate administration (on page
45
)
Two-factor authentication (on page
46
)
Directory settings (on page
51
)
iLO 2 encryption
HP SIM single sign-on ("
HP SIM single sign-on (SSO)
" on page
56
)
Remote Console Computer Lock (on page
59
)
iLO 2 security options enables iLO 2 to provide the following security features:
User-defined TCP/IP ports
User actions logged in the iLO 2 Event Log
Progressive delays for failed login attempts
Support for X.509 CA signed certificates
Support for securing RBSU