Go to main content

Oracle® ILOM Security Guide For Firmware Releases 3.x and 4.x

Exit Print View

Updated: May 2019
 
 

Use Secure Protocols for Remote Management

Oracle ILOM supports a number of different remote management protocols. In some cases, support is provided for both encrypted and non-encrypted versions of the same protocol. For security reasons, you should always use, if possible, the most secure protocol available. For a list of supported encrypted and non-encrypted protocols, see the following table.

Table 9  Supported Secure Protocols
Category
Secure/Encrypted
Non-encrypted
Web browser access
HTTPS
HTTP
Command-line access
SSH
None supported
IPMI access
TLS (preferred service for IPMI, see Configure IPMI Management Access for Increased Security)
IPMI v2.0
IPMI v1.5
Protocol access
SNMPv3
SNMPv1/v2c