HPE Community read-only access December 15, 2018
This is a maintenance upgrade. You will be able to read articles and posts, but not post or reply.
Hours:
Dec 15, 4:00 am to 10:00 am UTC
Dec 14, 10:00 pm CST to Dec 15, 4:00 am CST
Dec 14, 8:00 pm PST to Dec 15, 2:00 am PST
ProLiant Servers (ML,DL,SL)
cancel
Showing results for 
Search instead for 
Did you mean: 

Hardening Guidlines recommended for BL and GbE2

 
Garth Reid
Occasional Visitor

Hardening Guidlines recommended for BL and GbE2

my customer is looking for a document that would provide hardening guidlines that are HP recommended for hardening the GbE2 switch and the BL server infrastructure.
1 REPLY
Jonas Back_2
Super Advisor

Re: Hardening Guidlines recommended for BL and GbE2

I'm interested in this aswell. But I don't know if there are any available. However we could dicuss it.

I would at least put the switches and their management VLAN on a seperate VLAN and then put accesslists to that VLAN so only authorized IP-addresses are allowed to communicate with thtat VLAN. And maybe you also should restrict in the switch which IP-adresses that are allowed to manage.

Of course, change SNMP READ/WRITE if you don't disable it. Also only allow an mgmtserver to poll SNMP.

Or if you're paranoid, only allow local connection to the serial management port.

Anyone else has any more ideas? Since theese were more general thoughts of how to secure network switches - not only for GbE2.