Oracle ILOM Security Guide For Firmware Release 5.1.x Oracle ILOM Post Deployment Practices for Increasing Security Maintaining a Secure Management Connection Maintaining a Secure Management Connection Consider the following information for maintaining a secure management connection to Oracle ILOM. Avoid Unauthenticated Host KCS Device Access Preferred Authenticated Host Interconnect Access Use Secure Protocols for Remote Management