of data, keystrokes, and security keys. The hardware design protects keys and sensitive password
information. The hardware design also facilitates a separation of the iLO management traffic from all
host server traffic.
A networked environment has inherent security risks. The iLO processor mitigates many of these risks
through authorization, authentication, and encryption. Administrators can further decrease the chance
of attacks by following security recommendations, being aware of access points to the iLO devices
and their host servers, and configuring their networks to eliminate any unnecessary services.
35