跳至主要內容
  • 簡單快速地下訂單
  • 檢視訂單及追蹤商品運送狀態
  • 建立並存取您的產品清單
  • 使用「公司管理」來管理您的 Dell EMC 網站、產品和產品層級連絡人。

iDRAC9 Security Configuration Guide

PDF

Overview

Dell PowerEdge servers have featured robust security for several generations, including the innovation of using silicon-based data security. As a key management component in Dell PowerEdge servers, the integrated Dell Remote Access Controller (iDRAC) offers industry-leading security features that adhere to and are certified against well-known NIST standards, Common Criteria, and FIPS-140-2.

For more information about iDRAC's certifications and standards see the white paper - Managing Web Server Certificates on iDRAC .

The iDRAC development team focuses on providing best in class server management capabilities and ensures that these can be exercised to meet a user's security requirements. The purpose of this document is to describe the security features offered by iDRAC9 that can be configured by the end user and provide the recommended settings and procedures that are required to maximize the security posture of the system.

The intended audience for this document includes system administrators who are responsible for maintaining and deploying servers and ensuring that network and infrastructure security best practices are followed.

NOTE: The information in this publication is provided "as-is." Dell Technologies makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. In no event shall Dell Technologies, its affiliates or suppliers, be liable for any damages whatsoever arising from or related to the information contained herein or actions that you decide to take based thereon, including any direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell Technologies, its affiliates or suppliers have been advised of the possibility of such damages.

The Security Configuration Guide intends to be a reference. The guidance is provided based on a diverse set of installed systems and may not represent the actual risk/guidance to your local installation and individual environment. It is recommended that all users determine the applicability of this information to their individual environments and take appropriate actions. All aspects of this Security Configuration Guide are subject to change without notice and on a case-by-case basis. Your use of the information contained in this document or materials linked herein is at your own risk. Dell reserves the right to change or update this document in its sole discretion and without notice at any time.


對此內容評分

準確
實用
易懂
這篇文章對您有用嗎?
0/3000 characters
  請給予評分 (1 到 5 顆星)。
  請給予評分 (1 到 5 顆星)。
  請給予評分 (1 到 5 顆星)。
  本文章是否有幫助?請選擇。
  評語中不得包含下列特殊字元:<>()\