I don't know why you have bridged the interfaces, but if they are both on the same switch you will have some major issues passing traffic for certain things and iLO would be one of them. You have to realize that the fact that iLO shares a port with the system's NIC doesn't mean it makes the port a switch. I have a feeling that the iLO ARP record may not be passed along or the wrong record is presented to the VMs.
Again, I am not sure why you bridged them but I would troubleshoot this by removing br0 and only use eth0 (where iLO is by default). Remove eth1 from the network temporarily and re-assign eth0 as the interface to be used by the VMs.
If the VMs can now access iLO, you may want to rethink your layout. Bonding the embedded interfaces to each other is not recommended since you will encounter yet again a similar issue with iLO due to potential ARP issues. Here are a few suggestions:
1. If you want redundancy, add an additional NIC and create a bonded interface between the card and eth1. Use balance-tlb or balance-alb if you don't have a switch that allows you to create LACP groups. Do not assign eth0 to be used by your OS, but have it connected to the network anyway. This will let your switch handle all the ARP records and iLO should be reachable by anything, and yet you still have redundant interfaces.
2. If you don't need redundancy, but still would like to have different networks to be manageable dynamically per each VM, then implement a couple of VLANs. This of course would require extra hardware such as a manageable layer2/3 switch and configuring the VLAN logical interfaces on eth0. iLO is VLAN happy as well, so you can have it anywhere you like.
3. Intel NICs usually behave better than Broadcom when managing this type of stuff, but you could get any 2-port or 4-port NIC and disable the onboard one. You can bond the ports as I suggested previously from within the very same card, and iLO will STILL work on the 1st port of the embedded NIC even after disabling it. Basically it will act as a bridge for iLO only and every VM should still reach it.
I have a feeling that you may have to explain better why you have created that bridge, but this is the best I could come up with the little information you gave me.