HP Integrity iLO 2 MP 5991-6005 Manuel d'utilisateur Page 25

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 199
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 24
Table 1-2 iLO 2 MP Supported Browsers and Client Operating Systems
Client Operating SystemBrowsers
OpenVMSLinuxWindowsHP-UXJava Plug-in 1.5.0_08
8.3SuSE
Red Hat
EnterpriseXP
WS 2003
Enterprise
11i
23/11.31
XXXXXFirefox 2.0.0.4
XXInternet Explorer 6.0
XHP Secure Web Browser 1.7.13
Related Links
Java for HP-UX
http://www.hp.com/products1/unix/java/versions/index.html
http://www.hp.com/products1/unix/java/archives/index.html
Java for OpenVMS
http://h18012.www1.hp.com/java/alpha
Firefox for HP-UX
http://www.hp.com/products1/unix/java/firefox/index.html
Note: 1.5.0.00 needs patch
http://www.hp.com/go/firefox
Firefox for Linux
http://linuxcoe.corp.hp.com
Firefox for Windows and Linux
http://www.mozilla.com/firefox
Browser Support 1.5.0
http://java.sun.com/j2se/1.5.0/system-configurations.html
Operating Systems for Montvale
http://psweb1.cup.hp.com/~projects/sisl_prgm_mgmt/mvx%20(Low-end%20Montvale)/mvx%20info.htm
Security
It is important to have strong security surrounding the iLO 2 MP device. HP security requirements
of the enterprise and architected the iLO 2 MP include the following:
Authentication iLO 2 MP incorporates authentication techniques with the use of 128-bit
Secure Socket Layer (SSL) encryption. It is password based for web and
password- and key-based for secure shell (SSH).
Authorization Using local accounts, iLO 2 MP enables you to define up to 19 separate
users and to vary the server access rights of each user. The directory
services capabilities of iLO 2 MP enables you to maintain network user
accounts and security policies in a central, scalable database that supports
thousands of users, devices, and management roles.
Integrity iLO 2 MP incorporates a trusted Java™ applet for vMedia.
Privacy iLO 2 MP uses SSL for web connections, RSL-RC4 encryption for integrated
remote console and remote serial console, and SSH-DES3/DES128 2.0
recommended encryption algorithms for SSH-based connections. You
can enable or disable telnet, IPMI over LAN, web, and SSH connectivity.
Login After initial failed login attempts (default three), a delay of approximately
one second is imposed on the serial connection and the login banner
warnings are repeated. All other connection types are disconnected.
Security 25
Vue de la page 24
1 2 ... 20 21 22 23 24 25 26 27 28 29 30 ... 198 199

Commentaires sur ces manuels

Pas de commentaire