iLO security setting recommendations

Hewlett Packard Enterprise recommends the following iLO security settings. For details about these settings, see the iLO 5 online help or the HPE iLO 5 User Guide. If a setting is not listed with a recommendation, determine the appropriate value based on your environment and security priorities.

Security Dashboard

Monitor all the security parameters without setting the Ignore option (default).

Remote Console security
  • Enable Remote Console Computer Lock and, optionally, configure a custom computer lock key sequence.

  • Enable IRC requires a trusted certificate in iLO to launch the .NET IRC by using an HTTPS connection.

Local user account controls

Configure up to 12 local user accounts, with a range of individual user privilege settings to support the security principle of least access.

Directory group account controls

Configure up to six directory groups to use with Kerberos authentication or schema-free directory integration.

Key management

Use an optional key manager to generate, store, serve, control, and audit access to data encryption keys. It enables you to protect and preserve access to business-critical, sensitive, data-at-rest encryption keys.

Firmware verification

Configure the Enable Background Scan option and choose the Integrity Failure Action.

Server access settings
  • Server Name—Leave this value blank and let the host OS assign it.

  • Server FQDN/IP Address—Leave this value blank and let the host OS assign it.

Account Service access settings
  • Authentication Failures Before Delay—One failure causes no delay (default)

  • Authentication Failure Delay Time—Ten seconds (default)

  • Authentication Failure Logging—Enabled-Every Failure

  • Minimum Password Length—Eight characters (default)

  • Password Complexity—Enabled

iLO access settings
  • Downloadable Virtual Serial Port Log—Disabled (default)

  • Idle Connection Timeout (minutes)—30 minutes (default)

  • iLO Functionality—Enabled (default)

  • iLO RIBCL Interface—Enabled (default)

    Hewlett Packard Enterprise recommends using the iLO RESTful API.

  • iLO ROM-Based Setup Utility—Enabled (default)

  • iLO Web Interface—Enabled (default)

  • Remote Console Thumbnail—Disabled

  • Require Host Authentication—Enabled

    The default value depends on the configured security state:

    • Production mode—Disabled by default.

    • High Security—Enabled by default.

    • FIPS or CNSA—Enabled by default and cannot be disabled.

  • Require Login for iLO RBSU—Enabled

  • Serial Command Line Interface Status—Enabled-Authentication Required (default)

    You must also set the Serial Command Line Interface Speed.

  • Show iLO IP during POST—Enabled (default)

  • Show Server Health on External Monitor—Enabled (default)

  • VGA Port Detect Override—Enabled (default)

  • Virtual NIC—Disabled

    The default setting in most versions of iLO is Disabled. In iLO 5 v2.10, the default setting is Enabled. When you reset iLO to the factory default settings, the Virtual NIC setting returns to the default setting for the installed version of iLO. Firmware upgrades or downgrades do not affect this setting.

Network access settings
  • Anonymous Data—Enabled (default)

  • IPMI/DCMI over LAN—Disabled (default, includes port setting)

  • Remote Console—Enabled (default, includes port setting)

  • Secure Shell (SSH)—Enabled (default, includes port setting)

  • SNMP—Disabled (includes port settings)

    This setting is disabled automatically when you enable a security state higher than Production or High Security.

  • Virtual Media—Enabled (default, includes port setting)

  • Virtual Serial Port Log Over CLI—Disabled (default)

  • Web Server—Enabled (default, must set non-SSL and SSL ports)

    If disabled, access is removed for RIBCL, iLO RESTful API, remote console, iLO Federation, and the iLO web interface.

  • 802.1X Support—Enabled

Update service settings
  • Downgrade Policy—Allow downgrades (default)

    CAUTION:

    Review the options in the HPE iLO 5 User Guide before you modify this setting.

  • Accept 3rd Party Firmware Update Packages—Disabled

iLO Service Port
  • iLO Service Port—Enabled (default)

  • USB flash drives—Disabled

  • Require authentication—Enabled

  • USB Ethernet adapters—Disabled

Secure Shell Key

Using SSH keys provides better security than simple password authorization.

Keys must be 2048-bit DSA or RSA (or ECDSA 384-bit keys in CNSA security state)

Authorized certificates for smart card or CAC environment

Each local user account must have an associated certificate.

Using a smart card with certificates provides better security than simple password authentication.

CAC/Smartcard settings:
  • CAC Smartcard Authentication—Enabled (requires an iLO Advanced license)

  • CAC Strict Mode—(Optional) Enabled

  • Directory User Certificate Name Mapping—When using directory integration, select the correct option according to your user certificate.

  • Import Trusted CA Certificates and revocation list—At least one trusted CA certificate must be installed, along with a revocation list.

  • OCSP Settings—Enter the URL of an accepted OCSP provider to check user certificates for authentication.

SSL certificates

Install a trusted SSL certificate for each iLO. Default self-signed certificates are not secure.

Security State

High Security (minimum)

Single sign-on

SSO Trust Mode—Trust by Certificate

Some HPE applications may not successfully use SSO when the iLO 5 security state is set to High Security and above. See your application documentation for more information.