<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Securing RILO in Server Management - Remote Server Management</title>
    <link>https://community.hpe.com/t5/server-management-remote-server/securing-rilo/m-p/3360093#M651</link>
    <description>Unclear if you mean iLO or RILOE...&lt;BR /&gt;&lt;BR /&gt;The recently updated iLO Security Technology Whitepaper TC040701TB covers many security  areas, including this one. It talks about iLO design, iLO Security, iLO Connectivity, DMZ concerns, Blade concerns, Recommendations, and other details.&lt;BR /&gt;&lt;BR /&gt;Get it from&lt;BR /&gt;&lt;A href="http://www.hp.com/servers/lights-out" target="_blank"&gt;http://www.hp.com/servers/lights-out&lt;/A&gt;&lt;BR /&gt;then click "ISS Technology Papers" then "Remote Management" then "Integrated Lights-Out Security Technology Brief" document TC040701TB, 07/2004&lt;BR /&gt;&lt;BR /&gt;There are a lot of other good technology briefs there as well...</description>
    <pubDate>Wed, 18 Aug 2004 18:02:32 GMT</pubDate>
    <dc:creator>acartes</dc:creator>
    <dc:date>2004-08-18T18:02:32Z</dc:date>
    <item>
      <title>Securing RILO</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/securing-rilo/m-p/3360092#M650</link>
      <description>Looking for a WP about how ILO interacts with the OS in relation to Security.  Since a RILO card is assigned to a NIC is is creating a bridge to the OS.  How can I properly Secure this environment?&lt;BR /&gt;Thanks,&lt;BR /&gt;Woody</description>
      <pubDate>Wed, 18 Aug 2004 10:46:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/securing-rilo/m-p/3360092#M650</guid>
      <dc:creator>Dave Wood_5</dc:creator>
      <dc:date>2004-08-18T10:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: Securing RILO</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/securing-rilo/m-p/3360093#M651</link>
      <description>Unclear if you mean iLO or RILOE...&lt;BR /&gt;&lt;BR /&gt;The recently updated iLO Security Technology Whitepaper TC040701TB covers many security  areas, including this one. It talks about iLO design, iLO Security, iLO Connectivity, DMZ concerns, Blade concerns, Recommendations, and other details.&lt;BR /&gt;&lt;BR /&gt;Get it from&lt;BR /&gt;&lt;A href="http://www.hp.com/servers/lights-out" target="_blank"&gt;http://www.hp.com/servers/lights-out&lt;/A&gt;&lt;BR /&gt;then click "ISS Technology Papers" then "Remote Management" then "Integrated Lights-Out Security Technology Brief" document TC040701TB, 07/2004&lt;BR /&gt;&lt;BR /&gt;There are a lot of other good technology briefs there as well...</description>
      <pubDate>Wed, 18 Aug 2004 18:02:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/securing-rilo/m-p/3360093#M651</guid>
      <dc:creator>acartes</dc:creator>
      <dc:date>2004-08-18T18:02:32Z</dc:date>
    </item>
  </channel>
</rss>

