I'm trying to completely lock down a server which has to exist outside of a firewall/directly routed to the internet and whilst I have hardened the base OS to the best of my ability, I had a moment of horror when I thought that if the worst should happen and someone was able to gain access, it may be possible that the DRAC could be used as a back door to our management network.
As far as I am aware, it is not possible to just connect and run arbitrary commands, you need a username and password - however, if given unlimited time and root access, I suppose a brute force may be possible, so, I was wondering how would I go about securing the DRAC?
Other than the last crash screen feature, I can't really think of any reason that the local host even needs access to the DRAC, so, I would like to completely disable local access.
Is running the following sufficient from the drac:
racadm config -g cfgRacTune -o cfgRacTuneLocalConfigDisable 1
And by running this, are there any down sides?
I could only find a small guide for the old iDrac 5, but, I was wondering if anything has changed/been added since?
update
This is a dedicated Drac (add on) card with a dedicated network port and the management network is a completely different subnet/network.
Whilst logged on via SSH to the Drac, I notice that you can do some funky stuff, I simply want to make sure that if the box was ever rooted/hacked, it is not possible to log on to the DRAC (even if given unlimited time/brute force from host) and basically make sure it is completely 100% isolated.