emc celerra network server · emc e-lab interoperability navigator ... (cli). you can also perform...

102
EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com EMC ® Celerra ® Network Server Release 6.0 Celerra Security Configuration Guide P/N 300-009-990 REV A01

Upload: trinhbao

Post on 03-Jun-2018

231 views

Category:

Documents


0 download

TRANSCRIPT

EMC CorporationCorporate Headquarters:

Hopkinton, MA 01748-9103

1-508-435-1000www.EMC.com

EMC® Celerra® Network ServerRelease 6.0

Celerra Security Configuration GuideP/N 300-009-990

REV A01

Celerra Security Configuration Guide2 of 102 Release 6.0

3 of 102Release 6.0Celerra Security Configuration Guide

Contents

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5Cautions and warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5User interface choices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6Related information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

Concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10Planning considerations for user identification and authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20Planning considerations for using an external LDAP-based directory server for user identification and authentication . . . . . . .22Planning considerations for role-based user access . . . . . . . . . . . .25Planning considerations for password security . . . . . . . . . . . . . . . .29Planning considerations for Public Key Infrastructure. . . . . . . . . . .30

Configuring the use of an external LDAP-based directory server for user identification and authentication . . . . . . . . . . . . . . . . . . . . . . . . .34Configuring password policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

Define password policy interactively . . . . . . . . . . . . . . . . . . . . . . . .37Define specific password policy definitions . . . . . . . . . . . . . . . . . . .38Set password expiration period . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38

Configuring session timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39Change the session timeout value . . . . . . . . . . . . . . . . . . . . . . . . . . .39

Customizing a login banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41Creating a message of the day (MOTD) . . . . . . . . . . . . . . . . . . . . . . . . . . .42Protecting session tokens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43Configuring network encryption and authentication using the SSL protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44

Using HTTPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44Using SSL with LDAP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44Change the default SSL protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . .44Change the default SSL cipher suite . . . . . . . . . . . . . . . . . . . . . . . . .45Postrequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46

Configuring PKI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47Creating the certificate provided by the persona . . . . . . . . . . . . . . .47Obtaining CA certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47Using the Control Station as the CA. . . . . . . . . . . . . . . . . . . . . . . . . .47Generate a key set and certificate request. . . . . . . . . . . . . . . . . . . . .48Send the certificate request to the CA . . . . . . . . . . . . . . . . . . . . . . . .51Import a CA-signed certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52List the available CA certificates . . . . . . . . . . . . . . . . . . . . . . . . . . .54Acquire a CA certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54Import a CA certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57Generate a new Control Station CA certificate . . . . . . . . . . . . . . . . .57Display the certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58Distribute the Control Station CA certificate . . . . . . . . . . . . . . . . . . .60

Managing PKI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61Display key set and certificate properties . . . . . . . . . . . . . . . . . . . .61Check for expired key sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62Clear key sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62

Celerra Security Configuration GuideRelease 6.0 4 of 102 Celerra Security Configuration GuideRelease 6.0 4 of 102

Display CA certificate properties . . . . . . . . . . . . . . . . . . . . . . . . . . .63Check for expired CA certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . .63Delete CA certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64

Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65Where to get help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65EMC E-Lab Interoperability Navigator . . . . . . . . . . . . . . . . . . . . . . . .65Troubleshooting the Control Station connection to a LDAP-based directory server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65Troubleshooting local user accounts . . . . . . . . . . . . . . . . . . . . . . . . .66Troubleshooting domain-mapped user accounts . . . . . . . . . . . . . . .68Troubleshooting certificate imports . . . . . . . . . . . . . . . . . . . . . . . . . .68Error messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70Training and Professional Services . . . . . . . . . . . . . . . . . . . . . . . . . .70

Appendix A: CLI role-based access setup . . . . . . . . . . . . . . . . . . . . . . . .71Appendix B: Supported SSL cipher suites . . . . . . . . . . . . . . . . . . . . . . . .81Appendix C: Understanding your LDAP-based directory server configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83

Active Directory Users & Computers . . . . . . . . . . . . . . . . . . . . . . . . .83Ldap Admin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99

5 of 102Release 6.0Celerra Security Configuration Guide

Introduction

The EMC® Celerra® Network Server implements a variety of security features to control user and network access, monitor system access and use, and support the transmission of encrypted data. These security features are implemented on the Control Station and Data Movers. This document explains why, when, and how to use these security features. A basic understanding of these features is important to understanding Celerra security. "Concepts" on page 10 provides more details.

This document is part of the Celerra Network Server documentation set and is intended for administrators responsible for the overall configuration and operation of the Celerra.

System requirements

Table 1 on page 5 describes the Celerra Network Server software, hardware, network, and storage configurations.

Cautions and warnings

If any of this information is unclear, contact your EMC Customer Support Representative for assistance.

If you do not change the default passwords during installation, you should change them as soon as possible.

User interface choices

The Celerra Network Server offers flexibility in managing networked storage that is based on your support environment and interface preferences. This document describes how to configure security features by using the command line interface (CLI). You can also perform many of these tasks by using the EMC Unisphere™ software.

The Unisphere online help contains additional information about managing your Celerra.

The Celerra Network Server Release Notes contain additional, late-breaking information about Celerra management applications.

Table 1 Security system requirements

Software Celerra Network Server version 6.0

Hardware No specific hardware requirements

Network No specific network requirements

Storage No specific storage requirements

Celerra Security Configuration Guide6 of 102 Release 6.0

Terminology

The Celerra Glossary provides a complete list of Celerra terminology.

access control entry (ACE): In a Microsoft Windows environment, an element of an access control list (ACL). This element defines access rights to a file for a user or group.

access control list (ACL): A list of access control entries (ACEs) that provide information about the users and groups allowed access to an object.

access policy: The policy that defines what access control methods (NFS permissions and/or Windows ACLs) are enforced when a user accesses a file on a Celerra system in an environment configured to provide multiprotocol access to some file systems. The access policy is set with the server_mount command and also determines what actions a user can perform against a file or directory.

authentication: The process for verifying the identity of a user trying to access a resource or object, such as a file or a directory.

Certificate Authority (CA): A trusted third party that digitally signs public key certificates.

Certificate Authority Certificate: A digitally signed association between an identity (a Certificate Authority) and a public key to be used by the host to verify digital signatures on Public Key Certificates.

command line interface (CLI): An interface for entering commands through the Control Station to perform tasks that include the management and configuration of the database and Data Movers and the monitoring of statistics for the Celerra cabinet components.

Common Internet File System (CIFS): A file-sharing protocol based on the Microsoft Server Message Block (SMB). It allows users to share file systems over the Internet and intranets.

Control Station: A hardware and software component of the Celerra Network Server that manages the system and provides an administrative user interface to Celerra components.

Data Mover: A Celerra Network Server cabinet component running its own operating system that retrieves files from a storage device and makes them available to a network client.

digital certificate: An electronic ID issued by a certificate authority that establishes a user’s credentials. It contains the user’s identity (a hostname), a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and a digital signature from the certificate-issuing authority so that a recipient can verify that the certificate is valid.

directory server: A server that stores and organizes information about a computer network's users and network resources, and that allows network administrators to manage users' access to the resources. X.500 is the best-known open directory service. Proprietary directory services include Microsoft’s Active Directory.

Hypertext Transfer Protocol (HTTP): The communications protocol used to connect to servers on the World Wide Web.

Hypertext Transfer Protocol Secure (HTTPS): HTTP over SSL. All network traffic between the client and server system is encrypted. In addition, there is the option to

7 of 102Release 6.0Celerra Security Configuration Guide

verify server and client identities. Typically server identities are verified and client identities are not.

Kerberos: An authentication, data integrity, and data privacy encryption mechanism used to encode authentication information. Kerberos coexists with NTLM (Netlogon services) and, using secret-key cryptography, provides authentication for client/server applications.

LDAP-based directory: A directory server that provides access by LDAP. Examples of LDAP-based directory servers include OpenLDAP or iPlanet (also known as Sun Java System Directory Server and Sun ONE Directory Server).

Lightweight Directory Access Protocol (LDAP): An industry-standard information access protocol that runs directly over TCP/IP. It is the primary access protocol for Active Directory and LDAP-based directory servers. LDAP Version 3 is defined by a set of Proposed Standard documents in Internet Engineering Task Force (IETF) RFC 2251.

Network File System (NFS): A distributed file system providing transparent access to remote file systems. NFS allows all network systems to share a single copy of a directory.

OpenLDAP: The open source implementation of an LDAP-based directory service.

persona: A means of providing an identity for a Data Mover as either a server or a client through a private key and associated public key certificate. Each persona can maintain up to two sets of keys (current and next), to allow for the generation of new keys and certificates prior to the expiration of the current certificate.

Public Key Infrastructure (PKI): A means of managing private keys and associated public key certificates for use in Public Key Cryptography.

Simple Network Management Protocol (SNMP): Method used to communicate management information between the network management stations and the agents in the network elements.

Secure Socket Layer (SSL): A security protocol that provides encryption and authentication. It encrypts data and provides message and server authentication. It also supports client authentication if required by the server.

Transport Layer Security (TLS): The successor protocol to SSL for general communication authentication and encryption over TCP/IP networks. TLS version 1 is nearly identical with SSL version 3.

X.509: A widely used standard for defining digital certificates.

XML API: An interface for remotely managing and monitoring a Celerra Network Server. The interface uses XML formatted messages, and is programming language neutral.

Celerra Security Configuration Guide8 of 102 Release 6.0

Related information

Specific information related to the features and functionality described in this document is included in:

◆ Celerra Network Server Command Reference Manual

◆ Online Celerra man pages

◆ Celerra Network Server Parameters Guide

◆ Celerra Glossary

◆ Installing Celerra Management Applications

◆ Configuring and Managing CIFS on Celerra

◆ Configuring NFS on Celerra

◆ Managing Celerra for a Multiprotocol Environment

◆ Configuring Celerra Naming Services

◆ Using Celerra FileMover

◆ Configuring Celerra Events and Notifications

◆ Auditing in the Celerra Control Station Technical Note

◆ Celerra Network Server on the Enterprise Network Technical Note

For general information on LDAP, refer to:

◆ RFC 2307, An Approach for Using LDAP as a Network Information Service

For specific information on Active Directory’s LDAP and SSL configuration, refer to:

◆ Microsoft Knowledge Base article How to enable LDAP over SSL with a third-party certification authority (ID 321051)

For specific information on OpenLDAP and SSL configuration, refer to the OpenLDAP website (www.openldap.org). If you are using a different non-Active Directory LDAP-based directory server, refer to that vendor’s documentation for information on LDAP and SSL configuration.

EMC Celerra documentation on Powerlink

The complete set of EMC Celerra customer publications is available on the EMC Powerlink® website. To search for technical documentation, go to http://Powerlink.EMC.com. After logging in to Powerlink, click Support, and locate the link for the specific product technical documentation required.

Celerra Support Demos

Celerra Support Demos are available on Powerlink. Use these instructional videos to learn how to perform a variety of Celerra configuration and management tasks. After logging in to Powerlink, click Support. Then click the link for the specific product required. Click Tools. Locate the link for the video you require.

9 of 102Release 6.0Celerra Security Configuration Guide

Celerra wizards

Celerra wizards can be used to perform set up and configuration tasks. Using Wizards to Configure Celerra provides you with an overview of the steps required to configure a Celerra Network Server using the Set Up Celerra wizard.

Celerra Security Configuration Guide10 of 102 Release 6.0

Concepts

Strong system security features are increasingly necessary to comply with new regulations and ensure greater protection against system attacks. Celerra implements a variety of features on both the Control Station and Data Movers to secure its infrastructure, control access, and protect data.

On the Control Station:

◆ To secure its infrastructure, Celerra provides a variety of features that can be used to tighten the operation of the Control Station. Table 2 on page 11 describes these features.

◆ To protect system resources against unauthorized access, Celerra supports strict user identification and authentication, role-based access, and customer-defined password policies. Table 3 on page 13 describes these features.

◆ To support the transmission of encrypted data, Celerra supports the SSL security protocol. Table 4 on page 15 describes this feature.

On Data Movers:

◆ To secure its infrastructure, Celerra provides a variety of features that can be used to tighten the operation of the Data Movers. Table 5 on page 16 describes these features.

◆ To protect the transmission of encrypted data, Celerra supports the SSL security protocol and public key certificate management for certain protocols. Table 6 on page 19 describes these features.

Although many of these features require explicit configuration and management, others have been introduced as basic changes to software operation. For example, beginning with Celerra version 5.6, the following changes have been implemented:

◆ Security between a user and the Unisphere software and between two Control Stations has been enhanced by changing the checksum used to sign the session token (cookie) from MD5 to SHA1. SHA1 produces a 160-bit hash value unlike MD5, which produces only a 128-bit hash value.

◆ Unnecessary services and dynamic ports have been removed from the Control Station's Linux operating system.

Note: Many of the Celerra’s security features are described elsewhere in the documentation library, as noted in the overview tables. Therefore, this document includes detailed configuration procedures for only a subset of the available security features.

11 of 102Release 6.0Celerra Security Configuration Guide

Table 2 Overview of Control Station features to secure infrastructure (page 1 of 2)

Feature What it does Restrictions More information

Session timeout Celerra enforces a session timeout for administrative sessions accessed from both Control Station shells and Unisphere. Sessions time out after a specified period of inactivity.

Session timeout is enabled by default.

You must be root to modify Control Station properties.

To manage shell session timeout, use the command /nas/sbin/ nas_config -sessiontimeout. "Configuring session timeout" on page 39 describes how to configure this feature.

To manage Unisphere session timeout, select Settings (UI Sessions tasks) > Manage Idle Timeout. You can find a description of this feature in Unisphere online help.

Login banner and message of the day (MOTD)

A login banner and message of the day (MOTD) provide a way for an administrator to communicate with Celerra users.

The same login banner is seen from the command line interface and Unisphere. The MOTD is seen only from the command line interface.

You must be root to modify Control Station properties.

To configure the banner through Unisphere, select System (System tasks) > Manage Control Stations. You can find a description of this feature in Unisphere online help.

To configure the banner and MOTD through the CLI, use a text editor to edit the /etc/issue or /etc/motd files. "Customizing a login banner" on page 41 and "Creating a message of the day (MOTD)" on page 42 describe how to configure these features.

Network services management

In Unisphere, you can list the current state of some network services (and associated communications ports and protocols) on the Control Station. You can enable, disable, and monitor these services. To improve Celerra security, you should restrict access to the Celerra by disabling network services that are not used in your environment.

You must be root to modify Control Station properties.

To manage network services through Unisphere, select System > Network > Network Services. You can find a description of this feature in Unisphere online help.

Session tokens (cookies) Celerra uses SHA1 to generate checksums to protect the session tokens (cookies) used to identify users after they log in. To enhance security, you can change the default SHA1 secret value used to generate the checksums.

When you change this value, existing session tokens (cookies) are no longer valid and current users of Unisphere will have to log in again.

You must be root to modify Control Station properties.

To manage session tokens (cookies), edit the file /nas/http/conf/secret.txt. "Protecting session tokens" on page 43 describes how to configure this feature.

Celerra Security Configuration Guide12 of 102 Release 6.0

Auditing Celerra provides configuration files and commands to capture management activities initiated from the Control Station, specifically access to key system files and end-user data.

You must be root to modify Control Station properties.

The Technical Note Auditing in the Celerra Control Station, available on EMC Powerlink, provides specific information about how to implement auditing.

Table 2 Overview of Control Station features to secure infrastructure (page 2 of 2)

Feature What it does Restrictions More information

13 of 102Release 6.0Celerra Security Configuration Guide

Table 3 Overview of Control Station features to control access (page 1 of 2)

Feature What it does Restrictions More information

User identification and authentication

Unique user accounts allow for more secure management of the Celerra. User accounts can be either a local user account or a local user account mapped from a LDAP or storage domain user account.

LDAP domain-mapped user accounts require that Celerra has access to a LDAP-based directory server. This may mean configuring access to an Active Directory or a non- Active Directory server such as OpenLDAP or iPlanet.

Storage domain-mapped user accounts require that the Celerra is joined to the storage domain of its

associated EMC CLARiiON®.

Users can be managed only through Unisphere.

The Linux commands available from the CLI (useradd, userdel, usermod, groupadd, groupmod, and groupdel) do not support Celerra role-based user access and should no longer be used to manage user and group accounts.

You must be root or a user who has root or security operator privileges to create a new user account.

"Planning considerations for user identification and authentication" on page 20 describes the concepts behind this feature.

To create and manage users with Unisphere, select Settings > User Management. You can find a description of this feature in Unisphere online help.

"Planning considerations for using an external LDAP-based directory server for user identification and authentication" on page 22 describes how Celerra interacts with an LDAP-based directory server and "Configuring the use of an external LDAP-based directory server for user identification and authentication" on page 34 describes how to configure this feature.

Role-based user access This feature enables you to assign users privileges that are appropriate to their responsibilities. Consequently, it simplifies the Unisphere and CLI interfaces for users by limiting the operations they can perform while protecting the system and customer data from operations by those who should not perform them.

A role defines the privileges (read, modify, or full control) you can perform on a particular Celerra object. Celerra offers both predefined and custom roles.

You must be root or a user who has root or security operator privileges to assign roles.

"Planning considerations for role-based user access" on page 25 describes the concepts behind this feature.

To create and manage role-based user access with Unisphere, select Settings > User Management. You can find a description of this feature in Unisphere online help.

Celerra Security Configuration Guide14 of 102 Release 6.0

Password quality policy Strong passwords are an important element of a security strategy. Celerra enforces several requirements to guarantee a password quality policy.

This feature defines password complexity requirements for all local users. This feature does not apply to domain-mapped users, whose passwords are governed by the policies within the domain.

You must be root to define the password quality policy.

"Planning considerations for password security" on page 29 describes the elements of a password quality policy.

To define password quality policy, use the command /nas/sbin/ nas_config -password. "Configuring password policy" on page 37 describes how to configure this feature.

Table 3 Overview of Control Station features to control access (page 2 of 2)

Feature What it does Restrictions More information

15 of 102Release 6.0Celerra Security Configuration Guide

Table 4 Overview of Control Station features to protect data

Feature What it does Restrictions More information

SSL (X.509) certificates for Unisphere

Unisphere uses SSL encryption and authentication to protect the connection between the user’s web browser and Celerra’s Apache web server. Digital certificates, whose authenticity is verified by a CA, are used by SSL to identify and authenticate the server.

Starting with 5.6, the Celerra software automatically generates the CA certificate and a new Apache certificate signed by that CA certificate at system installation or software upgrade if these certificates do not already exist.

In the case of Unisphere, the Control Station serves as a limited purpose CA, signing the certificate provided by the Apache web server.

If you change Celerra's hostname, you have to regenerate the Control Station’s CA and Apache certificates. When you generate a new CA certificate, a matching Apache certificate is also generated.

If you only change Celerra's domain name or IP address, you can just regenerate the Apache web server’s certificate.

Once you regenerate the certificates, any browsers or systems using the previous certificates need to install the new certificates.

You must be root to modify Control Station properties.

Installing Celerra Management Applications describes how to configure this feature.

The Celerra white paper Using Unisphere in Your Web Browsing Environment: Browser and Security Settings to Improve Your Experience, available on EMC Powerlink, provides information about how and why to install the certificates.

Network encryption and authentication using LDAP over SSL

Celerra supports SSL encryption and authentication on the LDAP connection between the Control Station and an LDAP-based directory server.

"Planning considerations for using an external LDAP-based directory server for user identification and authentication" on page 22 describes how Celerra interacts with an LDAP-based directory server, and "Configuring the use of an external LDAP-based directory server for user identification and authentication" on page 34 describes how to configure this feature.

Celerra Security Configuration Guide16 of 102 Release 6.0

Table 5 Overview of Data Mover features to secure infrastructure (page 1 of 3)

Feature What it does Restrictions More information

Network services management

In Unisphere, you can list the current state of some network services (and associated communications ports and protocols) on the Data Movers. You can enable, disable, and monitor these services. To improve Celerra security, you should restrict access to the Celerra by disabling network services that are not used in your environment, for example, FTP.

Some services that are running on the Data Movers require a reboot for changes to take effect.

To manage network services through Unisphere, select System > Network > Network Services. You can find a description of this feature in Unisphere online help.

CIFS Kerberos authentication

Since Kerberos is now the recommended authentication method in Windows environments, you may want to disable NTLM authentication. (By default, Celerra allows both Kerberos and NTLM authentication.)

To set CIFS server authentication mode to Kerberos only, use the command server_cifs <movername> -add compname=<comp_name>, domain=<full_domain_name>, authentication=kerberos.

The server_cifs man page describes how to configure this setting. Configuring and Managing CIFS on Celerra describes authentication.

NFS security settings Although generally regarded as a vulnerable file-sharing protocol, you can make NFS more secure by using the following configuration settings:

• Defining read-only access for some (or all) hosts

• Limiting root access to specific systems or subnets

• Hiding export and mount information if a client does not have mount permissions for the file system corresponding to that entry

In addition, if strong authentication is required, you can configure Secure NFS, which uses Kerberos.

All NFS exports are displayed by default. To hide NFS exports, you must change the value of the forceFullShowmount parameter.

Configuring NFS on Celerra describes how to configure these settings.

17 of 102Release 6.0Celerra Security Configuration Guide

Access policies Celerra’s set of customizable access modes allow you to choose the best possible interaction between NFS and CIFS access for your environment.

You can select how security attributes are maintained and the type of interaction between NFS and CIFS users including:

• Separate• CIFS dominant• NFS dominant• Equal • Mixed (used to achieve a

high level of synchronization between the two protocols)

The mixed access policy is required when using NFSv4.

Managing Celerra for a Multiprotocol Environment describes how to configure this feature.

Windows-style (NT) credentials for UNIX users

Celerra allows you to create a common Windows-style (NT) credential. Users therefore have the same credentials regardless of their file access protocol, providing more consistent access control.

Managing Celerra for a Multiprotocol Environment describes how to configure this feature.

SNMP management The SNMP community string provides the basis for security in SNMP. The default community name is the well-known name public. This name should be changed to prevent unwanted access to Celerra.

Use the server_snmp -community command to assign a new value to a server SNMP agent’s community for a Data Mover.

SNMP is used for communication between the Control Station and Data Mover, so disabling it can interfere with some functions. For example, the server_netstat command will not work.

Configuring Celerra Events and Notifications describes how to configure this feature.

Table 5 Overview of Data Mover features to secure infrastructure (page 2 of 3)

Feature What it does Restrictions More information

Celerra Security Configuration Guide18 of 102 Release 6.0

IP packet reflect IP packet reflect provides your network with an additional security level. Because reply packets always go out the same interface as the request packets, request packets cannot be used to indirectly flood other LANs. In cases where two network devices exist, one connected to the Internet and the other connected to the intranet, replies to Internet requests do not appear on the intranet. Also, the internal networks used by Celerra are not affected by any packet from external networks.

Configuring and Managing Celerra Networking describes how to configure this feature.

Table 5 Overview of Data Mover features to secure infrastructure (page 3 of 3)

Feature What it does Restrictions More information

19 of 102Release 6.0Celerra Security Configuration Guide

Table 6 Overview of Data Mover features to protect data

Feature What it does Restrictions More information

Network encryption and authentication through SSL

Celerra supports SSL encryption and authentication for both LDAP and HTTP connections between Data Movers and various external services.

SSL on Data Mover connec-tions can be configured and managed only through the CLI.

"Configuring network encryption and authentication using the SSL protocol" on page 44 describes how to configure parameters associated with this feature.

Configuring Celerra Naming Ser-vices and Using Celerra FileM-over describe how to configure and manage SSL for these fea-tures.

Public key certificates The PKI framework provides the software management and database systems to support the use of digital certificates for Data Mover LDAP and HTTP connections on which SSL is enabled.

The Celerra PKI framework supports only X.509 public key certificates.

"Planning considerations for Public Key Infrastructure" on page 30 describes the concepts behind this feature.

"Configuring PKI" on page 47 and "Managing PKI" on page 61 describe how to configure and manage this feature by using the CLI.

To configure and manage PKI through Unisphere, select Settings > Public Key Certificates. You can find a description of this feature in Unisphere online help.

Celerra Security Configuration Guide20 of 102 Release 6.0

Planning considerations for user identification and authentication

Creating unique users, each with privileges appropriate to their responsibilities, simplifies Celerra management by limiting the operations that users can perform as well as by protecting system and customer data from operations by users who should not perform them.

The administrators feature enables you to define:

◆ Users who need to view, configure, or manage Celerra file server operation

◆ Groups by which to organize users

◆ Roles to associate with groups

◆ Privilege levels that define the roles for accessing and controlling all Celerra objects

For simplified management, the user management feature also provides the ability to use an external LDAP directory server as a centralized repository of user accounts.

In addition, user accounts created to manage storage are mapped to Celerra user accounts so that storage domain global users can be given privileges to access and control Celerra objects.

The association of specific privileges with users, also referred to as roles, is supported for users who access the Celerra through the CLI, Unisphere, and the XML API.

Note: This feature is different from the existing Control Station access control support managed by using the nas_acl command.

Default users

Celerra provides two default user accounts: root and nasadmin. You can create additional users, each with privileges appropriate to their responsibilities. The root user can access and control every object and action in Celerra. The nasadmin user has the same access and control as root with certain exceptions.

Table 8 on page 26 lists the Unisphere features root and nasadmin can access and control. Table 14 on page 78 lists the CLI commands that only root or nasadmin or, in some cases, an user account associated with the root and nasadmin roles can execute.

"Planning considerations for role-based user access" on page 25 provides more information on how root and nasadmin are affected by role-based access.

Note: The privileges assigned to root and nasadmin cannot be modified and these accounts cannot be disabled or deleted.

Creating new users

You can also create additional user accounts, each with privileges appropriate to their responsibilities. Create new user accounts by using Settings > User

21 of 102Release 6.0Celerra Security Configuration Guide

Management > Users > Create. Unisphere online help provides a detailed explanation of this procedure.

Note: Beginning with version 5.6, you should no longer create user accounts through the CLI. The Linux commands previously used in the CLI to manage user and group accounts (useradd, userdel, usermod, groupadd, groupmod, and groupdel) do not support Celerra role-based access and will no longer set up entries recognized by the Celerra software.

To create a new user account, you must be root or a user who has root or security_operator privileges. "Planning considerations for role-based user access" on page 25 describes how privileges are assigned and used.

User accounts can be a local user account, a LDAP domain user account mapped from a LDAP domain account (described in "LDAP domain-mapped user accounts" on page 21), or a storage domain global user account mapped from a storage domain account (described in "Storage domain global user accounts" on page 21).

Note: When logging in to Unisphere with a local user account, select Scope and change the value to Local to indicate you are using a local user account that will be authenticated by and used to manage the Celerra system only.

LDAP domain-mapped user accounts

A LDAP domain-mapped user account uses the username and password specified on the LDAP domain server. This type of user account is always authenticated on the LDAP domain server. If the LDAP domain server is not available, the user is not able to log in.

Mapping users to local user accounts provides the mechanism for verifying that a user who is authenticated by an external LDAP directory server is authorized to access the Celerra, and that the user has the necessary local credentials, including a UID, to perform tasks.

Celerra provides the ability to automatically create local user accounts for LDAP domain users. When enabled, a local user account is established for any LDAP domain-mapped user who can successfully authenticate with the LDAP domain server and who belongs to at least one group mapped to the Celerra system. The LDAP domain user account's local account name will be the same name as the domain username along with the appended domain name (for example, joe.corp). If that name already exists locally, a number will be appended to the username (for example, joe1.corp). The appended number is the next unused number in sequence.

Note: When logging in to Unisphere with a LDAP domain user account, select Use LDAP to indicate the user account will be authenticated by the LDAP domain server. Select local scope to manage the Celerra system only. Select global scope to manage all systems within the storage domain.

Storage domain global user accounts

In addition to local user accounts and user accounts mapped from a LDAP domain account, a user account can be a local user account mapped from a storage domain global user account. Beginning with version 6.0, when a Celerra is joined to the storage domain of its associated CLARiiON, the existing storage domain global user account is imported into the Celerra user account database so that the global

Celerra Security Configuration Guide22 of 102 Release 6.0

user account can also be used to manage the Celerra system. A storage domain-mapped user account uses the username and password specified in the storage domain. This type of user account is always authenticated in the storage domain.

By default, Unisphere expects that a storage domain user account be used to log in. Logging in using a global user account allows you to manage both Celerra and CLARiiON systems. However, since Celerra initially gives a storage domain-mapped user the operator role (read-only privileges), you must change the role with which it is associated to give it administrator privileges.

Note: Alternatively, you can manage both Celerra and CLARiiON systems by logging in using a LDAP domain user account that is recognized by both systems.

You define roles by using Settings > User Management > Roles > Create. Unisphere online help provides a detailed explanation of this procedure.

Specifying user access to the Celerra

Users can access the Celerra system through the Control Station shell command line interface (CLI), Unisphere, or XML API.

Note: The XML API allows you to create your own GUI or other types of management interface. Like Unisphere and certain CLI commands, the XML API uses the Celerra software interface between the web user interface presentation layer and the core Control Station code, referred to as the appliance layer or APL. Consequently, access to the Celerra through the XML API must be specifically enabled.

When you create a new user, you must specify the type of access that user has to the Celerra. By default, a new user has no access.

When a local user account is created automatically for a domain-mapped user that new user is given access to Unisphere and the XML API by default.

Planning considerations for using an external LDAP-based directory server for user identification and authentication

A user account can be identified and authenticated by an external directory server when the user logs in to the Celerra Control Station. The external directory server provides a centralized repository of user accounts, simplifying management.

The external directory server can be an LDAP-based Active Directory or non-Active Directory server:

◆ Active Directory is an LDAP-based directory service used in Windows that provides management of user and group accounts, security, and distributed resources.

◆ OpenLDAP and iPlanet (also known as Sun Java System Directory Server and Sun ONE Directory Server) are distributed LDAP-based directory servers that provide a central repository for storing and managing identity profiles, access privileges, and application and network resource information.

Understanding the directory server

An LDAP-based directory server organizes information in a hierarchical directory structure unique to a particular organization’s needs. Each object stored in the directory is represented by a directory entry. An entry is formed by one or more

23 of 102Release 6.0Celerra Security Configuration Guide

attributes. Entries are stored in a hierarchical form in the directory tree. Each entry is uniquely defined by its distinguished name (DN) which enumerates the position of this entry in the tree. For example, the distinguished name for the admin group is "cn=admin,ou=group,dc=mycompany,dc=com". Using LDAP, one may query an entry and request all the entries and their attributes below the requested entry.

An example of an LDAP-based directory structure is as follows:

dc= indicates domain components and ou= indicates organizational units consisting of people, groups, hosts, and netgroups. Typically, the cn attribute is used to indicate the name by which a particular entry is commonly known. The directory structure can be changed. You inform the Data Mover about your organization’s directory structure by uploading a custom client configuration profile or configuration file. For example, your organization’s user information might be stored in a container called users rather than people, and hosts in a container called computers rather than hosts. You can also define several containers for the same object class.

Configuring access

To configure the Control Station’s LDAP-based client, you must have the following information:

◆ domain name — Indicates the root of the LDAP directory tree, that is, where in the LDAP directory tree to begin a search for information. Also known as the base distinguished name.

For example, the base distinguished name for the example LDAP-based directory structure is dc=mycompany,dc=com. Active Directory assumes that the attribute type is dc so the base distinguished name can be expressed as simply mycompany.com.

Note: Celerra supports only a single LDAP domain. It does not support trees or forests. Consequently, references to other domains are not followed.

◆ bind distinguished name — Indicates the identity used to bind to the LDAP service, that is, the user or account permitted to search the LDAP directory within the defined search base.

Typically, Active Directory assumes a bind distinguished name format of cn=<acctname>,cn=users,dc=<domain component>,dc=<domain component>.

Note: The Active Directory administrator can create users in other locations within Active Directory, in which case the bind distinguished name path may be different.

dc=mycompany,dc=com

ou=hostsou=people ou=group ou=netgroup

Celerra Security Configuration Guide24 of 102 Release 6.0

An OpenLDAP directory server accepts different bind distinguished name formats such as cn=<acctname>,uid=<name>,ou=people,dc=<domain component>,dc=<domain component> or uid=<name>,dc=users,dc=<domain component>,dc=<domain component>.

◆ user search path and name attribute — Indicate the directory branch Celerra will search for an instance of the name attribute whose value is the user’s account name.

Typically, Active Directory assumes a user search path and name attribute of cn=<acctname>,cn=users,dc=<domain component>,dc=<domain component>.

Note: The Active Directory administrator can create users in other locations within Active Directory, in which case the user search path may be different.

An OpenLDAP directory server accepts different bind distinguished name formats such as uid=<name>,ou=people,dc=<domain component>,dc=<domain component> or uid=<name>,dc=users,dc=<domain component>,dc=<domain component>.

◆ group search path, name attribute, group class and member — Indicate the directory branch Celerra will search for an instance of the attribute whose value is the user’s group name. The group may be further specified by identifying the class in which the group is stored and the attribute of that class.

Active Directory assumes a group search path and name attribute of cn=<acctname>,cn=users,dc=<domain component>,dc=<domain component>. In Active Directory, groups and users are stored in the same hierarchy. The group class is called group and the default attribute value is member.

Note: The Active Directory administrator can create groups in other locations within Active Directory, in which case the group search path may be different.

In other directory servers, the class may be posixGroup, groupOfNames, or groupOfUniqueNames. If the group class value is groupOfUniqueNames, the default attribute value is uniqueMember. If the group class value is groupOfNames, the default attribute value is member. If the group class value is posixGroup, the default attribute value is memberUid.

Connecting to the directory server using SSL

To protect LDAP traffic and improve client and server application security, the LDAP-based directory server can support and, in some cases, require the use of SSL. SSL provides encryption and authentication capabilities. It encrypts data over the network and provides message and server authentication. It also supports client authentication if required by the server. SSL uses digital certificates, whose authenticity is verified by a CA.

The LDAP client, using the underlying SSL client, authenticates the certificate received from the LDAP-based directory server. The CA certificate (for the CA that signed the directory server's certificate) must have been imported into the Control Station for the certificate verification to succeed. In addition, the subject from the server's certificate must contain the hostname or IP address of the server, otherwise the certificate verification fails.

25 of 102Release 6.0Celerra Security Configuration Guide

Note: The Control Station LDAP-based client implementation does not support SSL-based client authentication.

"Configuring the use of an external LDAP-based directory server for user identification and authentication" on page 34 describes how to configure this feature.

Planning considerations for role-based user access

A user account is always associated with a primary group and each group is assigned a role. A role defines the privileges (that is, the operations) the user can perform on a particular Celerra object. Beginning in version 5.6, you must have the appropriate privileges to access and control Celerra objects.

Groups and roles

A user account is always associated with a primary group. It can also be associated with other groups to a maximum of 17. Like user accounts, groups can be either a local group or a local group mapped to a domain group.

Celerra offers both predefined and custom groups. Predefined groups cannot be modified or deleted. Each group is assigned a role. A group can be assigned only one role at a time, although a role can be associated with many groups. If a group is not assigned a role, the group is given the default role of operator, which has read privileges only. Table 7 on page 25 lists the predefined groups and their associated roles.

Table 7 Predefined groups and their associated roles (page 1 of 2)

Group name Associated role

backup backup_operator

fullnas nasadmin

nasadmin operator

network network_admin

opadmin operator

root root

security security_operator

storage storage_admin

imported_administrator imported_administrator

imported_manager imported_manager

imported_monitor imported_monitor

Celerra Security Configuration Guide26 of 102 Release 6.0

Note: Groups and roles with the prefix imported are mapped from storage domain groups and roles. User accounts created to manage storage are mapped to Celerra user accounts, groups, and roles so that storage users can be given privileges to access and control Celerra objects.

A user can have multiple roles by belonging to multiple groups. In this case, a union of these roles determines what operations the user can perform.

You can create new groups by using Settings > User Management > Groups > Create.

Roles and privileges

A role defines the privileges (operations) a user can perform on a particular Celerra object. There are three levels of privileges:

◆ Read — Allows a user to view objects. By default, all users have read privileges on all objects.

◆ Modify — Allows a user to make changes to an object.

◆ Full control — Allows a user to create and delete objects and make significant changes. By default, all users have full control of the task object.

Celerra offers both predefined and custom roles. Predefined roles (also identified as system roles) cannot be modified. Custom roles (also identified as user roles) are roles defined by administrators.

The predefined roles (and the Unisphere sections and CLI commands over which those roles have full control privileges) are listed in Table 8 on page 26.

imported_replication imported_replication

imported_security_admin imported_security_admin

Table 8 Unisphere and CLI full control privileges given to predefined roles (page 1 of 3)

Predefined rolesUnisphere sections over which role has full control

Associated CLI commands

root All Unisphere sections

Note: To have full control over Control Station properties and Connect Home, you must be logged in as the root user. A user assigned root privileges does not have full control over these objects.

All commands

Table 7 Predefined groups and their associated roles (page 2 of 2)

Group name Associated role

27 of 102Release 6.0Celerra Security Configuration Guide

nasadmin All Unisphere sections except:

System (System tasks) > Manage Control Stations

System (System tasks) > Setup Celerra Wizard > Control Station setup

System (Service tasks) > Manage Connect Home

Settings > User Management (users, groups, & roles)

Settings > User Management (UI Sessions tasks) > Manage Idle Timeout

All commands with some exceptions. See Table 14 on page 78 for a list.

security operator Settings > User Management

Settings > Public Key Certificates

nas_licenseserver_certificateserver_kerberosserver_security

backup operator Replicas > Checkpoints

Storage > Virtual Tape

fs_ckptnas_ckpt_scheduleserver_mount server_mountpointserver_umountserver_vtlu

filemover_application Storage > File Systems cel_fsfs_dhsmfs_groupfs_timefindernas_fsnas_fsckserver_httpserver_mpfsstat

network admin System > Network > Interfaces

System > Network > Devices

System > Network > DNS

System > Network > Routes

System > Network (Network tasks) > Manage NIS Settings

server_arpserver_dnsserver_ftpserver_ifconfigserver_ldapserver_nisserver_ripserver_routeserver_snmpserver_snmpdserver_sysconfig

Table 8 Unisphere and CLI full control privileges given to predefined roles (page 2 of 3)

Predefined rolesUnisphere sections over which role has full control

Associated CLI commands

Celerra Security Configuration Guide28 of 102 Release 6.0

The ability to select a predefined role or define a custom role that gives a user the necessary privileges to execute a command is not available for all CLI commands. The specific command actions available when Modify or Full Control privileges are selected are listed in "Appendix A: CLI role-based access setup" on page 71. Commands not included in this list can only be performed by the default user accounts root and nasadmin or, in some cases, by a user account associated with the root and nasadmin roles.

You define roles using by Settings > User Management > Roles > Create.

Default user privileges

The user account root has its primary group membership in the root group that is associated with the root role.

The user account nasadmin has its primary group membership in the nasadmin group, which is associated with the operator role for read-only access. In addition, it is a member of the fullnas group, which is associated with the nasadmin role for modify and full-control access to almost all Celerra objects.

By default, a new user is assigned to the nasadmin group, which means the user has only read privileges.

storage admin Storage > File Systems

Storage > Data Migration

Storage > Storage Pools

Storage > Volumes

cel_fsfs_dhsmfs_groupfs_rdffs_timefindernas_disknas_fsnas_fscknas_poolnas_quotasnas_slicenas_storagenas_volumeserver_cdmsserver_devconfigserver_httpserver_mountserver_mountpointserver_mpfsstatserver_umount

operator n/a Display-type options for all commands (such as, -info, -list, -status, -verify)

sd_name n/a n/a

Table 8 Unisphere and CLI full control privileges given to predefined roles (page 3 of 3)

Predefined rolesUnisphere sections over which role has full control

Associated CLI commands

29 of 102Release 6.0Celerra Security Configuration Guide

Note: In the role-based user access feature, the nasadmin group is associated with the more restrictive operator role. The broader privileges previously associated with the default nasadmin user account are now accessed through membership in the fullnas group. When upgrading to version 5.6, all users previously associated with the nasadmin group are automatically assigned membership in the fullnas group so they retain modify and full-control access to most Celerra objects.

What happens once roles are assigned

A user must have the appropriate privileges to access and control Celerra objects.

Using Unisphere

If a user uses Unisphere to access the Celerra system and that user is not authorized to perform a certain function that function is dimmed and unavailable. This can occur in menus, buttons, and fields.

Using the CLI

If a user uses the CLI to access the Celerra system and that user is not authorized to perform a certain function, the Celerra software returns an error message. This error message indicates that the user does not have permission to perform this operation and that the role database has to be modified in order for the user to get permission.

Planning considerations for password security

Strong passwords are an important element of a security strategy.

Password quality policy

To ensure that sufficiently strong passwords are chosen by all local users, you can define a password quality policy that enforces a certain complexity for user-defined passwords. This feature does not apply to domain-mapped users, whose passwords are governed by the policies within the domain.

The default Celerra password policy includes the following requirements:

◆ A minimum password length of 8 characters

◆ A maximum of 3 attempts to define a new password of acceptable value before the command fails

◆ A minimum of 3 characters that were not in the previous password

◆ A minimum of one numeral in the new password

Note: There is currently no requirement to use special characters (such as !, @, #, $, %, &, ^, and *) or lowercase and uppercase characters in the password.

Celerra also supports a default password expiration period of 120 days.

"Configuring password policy" on page 37 describes how to configure this feature.

Note: Changes made to the password quality policy apply only to password defined after the policy is revised.

Celerra Security Configuration Guide30 of 102 Release 6.0

Changing default passwords

Celerra provides two default user accounts: root and nasadmin. Both accounts are assigned the password nasadmin by default. The Celerra software installation procedure allows you to enter a different password, but a new password is not required.

!CAUTION!If you do not change the default passwords during installation, you should change them as soon as possible.

You choose and change passwords through the User Properties dialog box in Unisphere. Unisphere online help provides a detailed explanation of this procedure.

Note: You can access the User Properties page from Settings > User Management > Users or from the User Name field on Control Station Properties.

Root and users with security operator privileges are not required to choose passwords that conform to password policy. Furthermore, when creating a new user account, root and users with security operator privileges can assign any password to that user.

However, if the user subsequently changes the password, this password is subject to the current password policy. Once the password policy is set, you will receive an error indicating the password is bad if you attempt to define a password that does not meet the specified requirements.

Planning considerations for Public Key Infrastructure

Celerra’s Public Key Infrastructure (PKI) provides the software management and database systems to support the use of digital certificates for Data Mover LDAP and HTTP connections on which SSL is enabled. Certificates, whose authenticity is verified by a Certificate Authority (CA), are used by SSL to identify one or both ends of a connection, providing stronger security between clients and servers.

Note: Celerra’s PKI framework supports the X.509 certificate standard. Certificates are encoded using Distinguished Encoding Rules (DER) and may be further encoded in Privacy Enhanced Mail (PEM) format for ease of distribution through email systems.

Personas

Personas are used to provide an identity for a Data Mover when it is acting as a server or a client. When negotiating a secure connection with a client (such as the external policy and migration software used with FileMover), the persona provides a private key and certificate to the Data Mover (which is acting as a server). This certificate provides the means by which the client can identify and authenticate the server. When negotiating a secure connection with a server (such as an external LDAP-based directory server) that is configured to require client authentication, the persona provides the private key and certificate to the Data Mover (which is acting as a client). The certificate provides the means by which the server can identify and authenticate the client.

31 of 102Release 6.0Celerra Security Configuration Guide

By default, each Data Mover is configured with a single persona named default. To create the certificate that the persona provides to the Data Mover, you first generate the persona’s public/private key set. You must then request a signed certificate from a CA. Certificate requests are generated in Privacy Enhanced Mail (PEM) format only.

Note: Currently, each Data Mover is allowed only one persona. Celerra does not support a mechanism to create additional personas.

If you are using the Celerra’s Control Station as the CA, the Control Station automatically receives the certificate request, generates and signs the certificate, and returns the certificate to the Data Mover. The Control Station can sign certificates for all the Data Movers in the cabinet. It cannot be used to sign certificates for any external hosts. "Using the Control Station as the CA" on page 47 describes the tasks for using a Control Station CA.

If you are using an external CA, you must send the certificate request manually. The request to sign the public key is generated with the public/private key set. Display the persona’s properties to verify its content. Obtain a copy of the certificate request and then send the request to the CA through that company’s website or email.

When the CA returns a signed certificate, you must import it to the Data Mover. To import the signed certificate, you can either provide a path and import a file, or cut and paste the associated text. A file can be in either Distinguished Encoding Rules (DER) or PEM format. You can cut and paste text only in PEM format.

Each persona can be associated with up to two sets of keys and certificates (current and next), to allow generating new keys and certificates before the expiration of the current certificate. When the next certificate (which is already valid) is imported, it and its associated key set immediately become the current key set and certificate.

Because the next certificate is typically generated when it is needed, you typically do not see a next certificate associated with a persona. However, a next certificate may be waiting if there is a time difference between the Data Mover and the CA (or the Control Station if it is serving as the CA). For example, a CA might prepare a certificate in advance by assigning it a future start date. Merging companies could set up such a certificate to have it in place for the official merge date.

The next certificate becomes the current certificate (and the current key and certificate are deleted) when the certificate becomes valid (per Data Mover time), and one of the following happens:

◆ The persona is queried (by either the CLI or Unisphere).

◆ The persona's key and certificate are requested by a Data Mover function (such as SSL).

After a certificate expires, any attempt to use the certificate results in a failure, typically a loss of connection or a failure to reconnect. When a new certificate is available, PKI deletes the old certificate and provides the new certificate when requested. However, if you did not obtain a new certificate before the current certificate expires, the certificate request will fail. PKI will not provide an expired certificate for a persona.

Celerra Security Configuration Guide32 of 102 Release 6.0

There is no automated way to check for expired public key certificates. You must check for expired certificates manually by listing the personas and examining the expiration dates of the associated certificates. You can then take action based on your organization’s business practices.

"Creating the certificate provided by the persona" on page 47 outlines the procedure for creating the key set and certificate that are provided by the persona to the Data Movers when the Celerra is configured as a server or client.

Certificate Authority (CA) certificates

When a Celerra-based client application requires a network connection with a server (such as FileMover’s connection with its secondary storage), the server provides a certificate as part of the negotiation for a secure connection. Celerra confirms the server’s identity by validating the certificate. It does this by verifying the server certificate’s signature with the public key from the CA certificate.

Obtaining the required CA certificates is a manual task. Typically, before actual operation, you must identify the appropriate CA. Then you must check the list of CA certificates that are available on the Celerra. If a new CA certificate is required and an external CA is being used, you can obtain the CA certificate from the company’s website or from the person responsible for security. If the CA is local (enterprise-level or inhouse), obtain the CA certificate from the person who manages the CA.

To make the CA certificate known to the Celerra, you must import it. You can provide a path and import a file, or cut and paste the text. A file can be in either DER or PEM format. You can cut and paste text only in PEM format.

"Obtaining CA certificates" on page 47 outlines the procedure for obtaining the certificate that is used to confirm the identity of a server.

Using the Control Station as the CA

The Celerra software automatically generates a key set and certificate for the Control Station when the system is installed or upgraded. The Control Station uses this key set and certificate to sign certificate requests from Data Movers. However, before the Control Station can successfully operate as a CA and be recognized by a Data Mover as such, you must complete several configuration tasks:

◆ Distribute the Control Station CA certificate to network clients. In order for a network client to validate a certificate sent by a Data Mover that has been signed by the Control Station, the client needs the public key from the CA certificate to verify the Data Mover certificate’s signature.

◆ Import the CA certificate (with the CA certificates from external CAs).

A copy of the Control Station certificate can be obtained only by using the CLI command nas_ca_certificate, as described in "Using the Control Station as the CA" on page 47.

If the Control Station key set and certificate are compromised, you can regenerate them. This task can be accomplished only through the CLI command nas_ca_certificate. After regenerating the Control Station key set and certificate, you have to regenerate a new key set and certificate request, and then import the signed certificate for any personas whose certificates are signed by the Control Station.

33 of 102Release 6.0Celerra Security Configuration Guide

Note: The Control Station continues to generate a separate key set for the SSL-based connection between Celerra’s Apache web server (on behalf of Unisphere) and a user’s web browser. However, the Control Station now uses the CA key set to sign the Apache web server’s certificate, meaning the certificate is no longer self-signed. Installing Celerra Management Applications describes how to manage certificates for Unisphere.

Celerra Security Configuration Guide34 of 102 Release 6.0

Configuring the use of an external LDAP-based directory server for user identification and authentication

The use of an external LDAP-based directory server provides a centralized repository of user accounts, simplifying management. "Planning considerations for using an external LDAP-based directory server for user identification and authentication" on page 22 provides a general description.

Prior to user login, you must perform a number of preliminary configuration tasks.

Step Action

1. Determine what LDAP-based directory server the Celerra will communicate with.

Note: Typically, the enterprise in which the Celerra is being used already uses an LDAP-based directory server to store user credentials. In this case, consult with the Active Directory or other LDAP-based directory server administrator to obtain connection information. Otherwise, you will need to study the available Active Directory or other LDAP-based directory server and discover the necessary connection information. There are several tools available to manage LDAP-based directory services. "Appendix C: Understanding your LDAP-based directory server configuration" on page 83 provides information on these tools.

2. Obtain the following information:

a. The base distinguished name of the root of the LDAP directory tree, that is, where in the LDAP directory tree Celerra would begin a search for information. The base DN can be expressed as a fully qualified domain name or in X.509 format using the attribute dc=. For example, if the fully qualified domain name is mycompany.com, the base DN is expressed as dc=mycompany,dc=com.

b. LDAP-based directory server’s IP address or hostname.c. IP address or hostname of a backup LDAP-based directory server.

35 of 102Release 6.0Celerra Security Configuration Guide

3. Request that the directory server administrator add an user or account name identifying the Celerra in the LDAP-based server’s directory structure. Or, if you have permission to create user and group accounts on the Active Directory or another LDAP-based directory server, add this user or account name yourself.

This account should be a restricted user account (such as a Domain Guest account) with read/search privileges for the directory.

Note: There are several tools available to manage LDAP-based directory services. "Appendix C: Understanding your LDAP-based directory server configuration" on page 83 provides information on these tools.

This entry identifies the Celerra as the user or account that will bind to the directory service, that is, the user or account permitted to search the LDAP directory within the defined search base. This entry is also known as the bind distinguished name.

For example, when using an Active Directory, the bind distinguished name might be defined as cn=<acctname>,cn=users,dc=<domain component>,dc=<domain component> and, when using an OpenLDAP directory server, uid=<name>,dc=users,dc=<domain component>,dc=<domain component> or cn=<acctname>,uid=<name>,ou=people,dc=<domain component>,dc=<domain component>.

4. Verify that the administrative users (and their associated groups) that will be logging in to the Control Station are defined in the LDAP-based directory server and determine the paths Celerra will search for an instance of the name attribute whose value is the user or group name.

If the user and group accounts do not already exist, request that the directory server administrator add them. Or, if you have permission to create user and group accounts on the Active Directory or another LDAP-based directory server, add these accounts yourself.

Note: There are several tools available to manage LDAP-based directory services. "Appendix C: Understanding your LDAP-based directory server configuration" on page 83 provides information on these tools.

For example, if users and groups are stored in an organizational unit with the common name users, the search path will be cn=users,dc=<domain component>,dc=<domain component>.

5. If the LDAP connection uses SSL, obtain the public certificate from the CA that signs the LDAP-based directory server's SSL server certificate. Celerra uses this CA certificate to verify the certificate received from the LDAP server. The certificate must be in a Base64 encoded format.

If the LDAP-based directory server uses an external CA, obtain the CA certificate from the CA company’s website. If the LDAP-based directory server uses an inhouse CA or if certificates are self-signed, obtain the CA certificate from the LDAP-based directory server administrator.

If you are not enabling SSL, a CA certificate is not required.

Step Action

Celerra Security Configuration Guide36 of 102 Release 6.0

6. With the information you have discovered, log in to Unisphere and use Settings > User Management (User Management tasks) > Manage LDAP Domain to configure the Control Station so it can access the LDAP-based directory server.

Note: If you select the Enable automatic domain user mapping field on the Manage LDAP Domain dialog box, Celerra automatically creates a local user account mapped to the domain user. Alternatively, you can create a user mapped to a domain user and associate it with a domain-mapped group.

Unisphere online help provides a description of these tasks.

Step Action

37 of 102Release 6.0Celerra Security Configuration Guide

Configuring password policy

This feature enables the Celerra root administrator to define password complexity requirements for all local users. "Planning considerations for password security" on page 29 provides a general description.

Note: This feature does not apply to domain-mapped users, whose passwords are governed by the policies within the domain.

Note: You must be root to execute the /nas/sbin/nas_config command.

Define password policy interactively

Action

To initiate a script that prompts for password policy definitions, use this command syntax: # /nas/sbin/nas_config -password

Output

Minimum length for a new password (Between 6 and 15): [8] Number of attempts to allow before failing: [3] Number of new characters (not in the old password): [3] Number of digits that must be in the new password: [1] Number of special characters that must be in a new password: [0] Number of lower case characters that must be in password: [0] Number of upper case characters that must be in password: [0]

Notes

The current value defined for each field is displayed in brackets. The original default values for each field are:

• Length: minimum 8 characters, range 6-15• Attempts: maximum of 3 attempts• New characters: minimum of 3 characters• Digits: minimum of 1 digit• Special, lowercase, and uppercase characters: 0

To change the value for each field, type a new value when prompted.

Celerra Security Configuration Guide38 of 102 Release 6.0

Define specific password policy definitions

Set password expiration period

The /etc/login.defs file contains the parameter used to set password expiration.

Action

To set specific password policy definitions, use this command syntax: # /nas/sbin/nas_config -password [-min <6..15>] [-retries <max_allowed>] [-newchars <min_num>] [-digits <min_num>] [-spechars <min_num>] [-lcase <min_num>] [-ucase <min_num>]

where<6..15> = minimum length of the new password. The default length is 8 characters. The length has to be a value between 6 and 15 characters. <max_allowed> = number of attempts a user can make to define an acceptable new password before the command fails. The default value is 3 attempts.<min_num> = minimum number of characters that must be in the new password that were not included in the old password. The default value is 3 characters.<min_num> = minimum number of digits that must be included in the new password. The default value is 1 digit.<min_num> = minimum number of special characters (such as !, @, #, $, %, &, ^, and *) that must be included in the new password. The default value is 0.<min_num> = minimum number of lowercase characters that must be included in the new password. The default value is 0.<min_num> = minimum number of uppercase characters that must be included in the new password. The default value is 0.

Example:

To set the minimum length of a new password to 10 characters, type:# /nas/sbin/nas_config -password -min 10

Output

#

Step Action

1. Log in to the CLI with your username and password. You must have root privileges to access the /etc/login.def file.

2. Change the value of the pass_max_days parameter in the /etc/login.def file by using vi or another text editor.

Note: The default expiration period is 120 days.

39 of 102Release 6.0Celerra Security Configuration Guide

Configuring session timeout

Celerra enforces a session timeout for both Unisphere sessions and Control Station shell sessions:

◆ To manage Unisphere session timeout, select Settings (UI Sessions tasks) > Manage Idle Timeout. You can find more detailed information in Unisphere online help.

◆ You can change the default value of the Control Station session timeout by using the command /nas/sbin/nas_config -sessiontimeout.

Note: You must be root to execute the /nas/sbin/nas_config command.

Prerequisites

The Control Station supports three shells:

◆ bash

◆ ksh

◆ tcsh

Each shell supports a session timeout feature. The Control Station session timeout option sets the session timeout value across the system, automatically updating the appropriate values in /etc/environment for the bash and ksh shells, and the autologout variable in /etc/csh.cshrc for the tcsh shell.

After the value is set, newly created shells are affected (but not any currently running shells).

Note: You can change the session timeout value for individual users by setting the relevant variable in the user’s shell configuration file (for example, ~/.bashrc). Values are not restricted if you edit the configuration file directly.

Change the session timeout value

The default session timeout value for Control Station shell sessions is 60 minutes. Inactivity or idle time is defined as the time since a primary shell prompt was displayed and no input has been received. Therefore waiting at a prompt within a command for some indeterminate amount of time is not affected by the session timeout value.

Celerra Security Configuration Guide40 of 102 Release 6.0

Disable session timeout

Action

To change the session timeout value, use this command syntax:# /nas/sbin/nas_config -sessiontimeout <minutes>

where:<minutes> = number of minutes for session timeout (in the range 5 through 240)

Example:

To change the session timeout value to 200 minutes, type:# /nas/sbin/nas_config -sessiontimeout 200

Output

#

Action

To disable session timeout, use this command syntax: # /nas/sbin/nas_config -sessiontimeout 0

or# /nas/sbin/nas_config -sessiontimeout off

Output

#

41 of 102Release 6.0Celerra Security Configuration Guide

Customizing a login banner

The /etc/issue file contains a login banner message or system identification, which appears before the login prompt. A login banner can be used for any informational purpose, but is most often used to warn users about unauthorized or improper use of the system.

Note: You can also customize the login banner by using System (System tasks) > Control Station Properties. You must have root privileges to access the Login Banner field.

Step Action

1. Log in to the CLI with your username and password. You must have root privileges to access the /etc/issue file.

2. Edit the /etc/issue file by using vi or another text editor.

EMC suggests you add an extra carriage return at the end of the banner message.

Use spaces, tabs, and carriage returns to format the message. In general, you should limit the size of the message to no more than a single screen.

Note: Because the login banner appears with the login prompt, do not include any sensitive information in the banner message.

3. Log in to the CLI or Unisphere to view the login banner and verify your changes.

Celerra Security Configuration Guide42 of 102 Release 6.0

Creating a message of the day (MOTD)

The message of the day file, /etc/motd, is displayed after a user successfully logs in. It can be used for any informational purpose, but it is particularly useful for sending messages that affect all users. The message might contain information about a server upgrade or an alert about an impending system shutdown. By default, this file is empty.

Step Action

1. Log in to the CLI with your username and password. You must have root privileges to access the /etc/motd file.

2. Edit the /etc/motd file by using vi or another text editor.

EMC suggests you add an extra carriage return at the end of the banner message.

Use spaces, tabs, and carriage returns to format the message. In general, you should limit the size of the message to no more than a single screen.

3. Log in to the CLI to display the MOTD and verify your changes.

43 of 102Release 6.0Celerra Security Configuration Guide

Protecting session tokens

The connection between a user and Unisphere and between two Celerra systems uses SHA1 to generate checksums to protect the session tokens (cookies) that identify users after they log in. The SHA1 secret value used to generate the checksums is set at random during installation. However, to enhance security, you can change the default SHA1 secret value.

Step Action

1. Log in to the CLI with your username and password. You must have root privileges to access the /nas/http/conf/secret.txt file.

2. Edit the /nas/http/conf/secret.txt file by using vi or another text editor.

Replace the default phrase with a new value and save the file.

When you change this value, existing session tokens are no longer valid and current users of Unisphere will have to log in again.

Celerra Security Configuration Guide44 of 102 Release 6.0

Configuring network encryption and authentication using the SSL protocol

Secure Socket Layer (SSL) is a session level protocol used to encrypt network transmissions on the Internet. It encrypts data and provides message and server authentication. It also supports client authentication if required by the server. SSL is independent of higher level protocols so it can encapsulate any of the application level protocols such as HTTP and LDAP:

◆ Hypertext Transfer Protocol (HTTP) is a fast, stateless, and object-oriented protocol used on the web. It enables web clients and servers to negotiate and interact. Unfortunately it has minimal security features. HTTPS (Secure) is a variant of HTTP used by a server that is SSL-enabled.

◆ Lightweight Directory Access Protocol (LDAP) is an industry-standard access protocol that runs directly over TCP/IP. It is the primary access protocol for Active Directory and other directory servers such as the Sun Java System Directory Server (iPlanet) and OpenLDAP.

Celerra supports SSL for Data Mover HTTP and LDAP connections.

Using HTTPS

You enable SSL on Data Mover HTTP connections through the server_http command. Currently, Celerra’s FileMover feature uses HTTPS and SSL’s encryption and authentication features. Using Celerra FileMover describes how to configure SSL with HTTP for use by FileMover. The keys and certificates used with SSL are managed by using PKI. PKI is available through the CLI and Unisphere. "Planning considerations for Public Key Infrastructure" on page 30 provides an overview of the PKI feature. "Configuring PKI" on page 47 and "Managing PKI" on page 61 describe how to configure and manage PKI through the CLI.

Using SSL with LDAP

You enable SSL on Data Mover LDAP connections through the server_ldap command. Currently, Celerra’s naming service support for OpenLDAP, iPlanet, and Active Directory uses LDAP and SSL’s encryption and authentication features. Configuring Celerra Naming Services describes how to configure SSL with LDAP for use by the OpenLDAP and iPlanet LDAP-based directory servers. The keys and certificates used with SSL are managed through PKI. PKI is available through the CLI and Unisphere. "Planning considerations for Public Key Infrastructure" on page 30 provides an overview of the PKI feature. "Configuring PKI" on page 47 and "Managing PKI" on page 61 describe how to configure and manage PKI through the CLI.

Change the default SSL protocol

Celerra supports the following SSL protocol versions:

◆ SSLv3

◆ TLSv1

45 of 102Release 6.0Celerra Security Configuration Guide

Change the default SSL cipher suite

A cipher suite defines a set of technologies to secure your SSL communications:

◆ Key exchange algorithm (how the secret key used to encrypt the data is communicated from the client to the server). Examples: RSA key or Diffie-Hellman (DH)

◆ Authentication method (how hosts can authenticate the identity of remote hosts). Examples: RSA certificate, DSS certificate, or no authentication

◆ Encryption cipher (how to encrypt data). Examples: AES (256 or 128 bits), RC4 (128 bits or 56 bits), 3DES (168 bits), DES (56 or 40 bits), or null encryption

◆ Hash algorithm (ensuring data by providing a way to determine if data has been modified). Examples: SHA-1 or MD5

The supported cipher suites combine all these items. "Appendix B: Supported SSL cipher suites" on page 81 lists the SSL cipher suites supported by Celerra.

Action

To change the default SSL protocol, use this command syntax:$ server_param <movername> -facility ssl -modify protocol -value <new_value>

where:<movername> = name of the Data Mover<new_value> = 0 (both SSLv3 and TLSv1), 1 (only SSLv3), or 2 (only TLSv1)

Note: The default value is 0.

Parameter and facility names are case-sensitive.

Examples:

To change the default SSL protocol to SSLv3 only, type:$ server_param server_2 -facility ssl -modify protocol -value 1

To change the default SSL protocol to TLSv1 only, type:$ server_param server_2 -facility ssl -modify protocol -value 2

Output

server_2 : done

Celerra Security Configuration Guide46 of 102 Release 6.0

Postrequisites

After changing SSL parameter values, you must reboot the Data Mover for a SSL protocol and cipher suite change to take effect.

Action

To change the default SSL cipher suite, use this command syntax:$ server_param <movername> -facility ssl -modify cipher -value <new_value>

where:<movername> = name of the Data Mover.<new_value> = string that specifies the new cipher value. If the value includes any special characters (such as a semi-colon, space character, or exclamation), it must be enclosed in quotation marks.

Note: The default cipher suite value is ALL:!ADH:!SSLv2:@STRENGTH, which means that Celerra supports all ciphers except the SSLv2, Anonymous Diffie-Hellman, and NULL ciphers, sorted by their “strength”, that is, the size of the encryption key.

Parameter and facility names are case-sensitive.

Example:

To change the default SSL cipher suite to a strong cipher (mainly AES128 and AES256) to be used by each new SSL connection, type:$ server_param server_2 -facility ssl -modify cipher -value ‘HIGH:@STRENGTH’

Output

server_2 : done

47 of 102Release 6.0Celerra Security Configuration Guide

Configuring PKI

"Planning considerations for Public Key Infrastructure" on page 30 provides a general description of this feature.

Creating the certificate provided by the persona

The procedure for creating the certificate provided by the persona to the Data Mover varies slightly depending on whether the Certificate Authority (CA) that signs the certificate is an external CA or the Celerra’s Control Station:

1. "Generate a key set and certificate request" on page 48

2. "Send the certificate request to the CA" on page 51 (not required if using the Control Station)

3. "Import a CA-signed certificate" on page 52 (not required if using the Control Station)

Obtaining CA certificates

The procedure for obtaining the CA certificates used to confirm the identity of a server includes the following tasks:

1. "List the available CA certificates" on page 54

2. "Acquire a CA certificate" on page 54

3. "Import a CA certificate" on page 57

Using the Control Station as the CA

The procedure for using the Control Station as the CA includes the following tasks:

1. "Generate a new Control Station CA certificate" on page 57

2. "Display the certificate" on page 58

3. "Distribute the Control Station CA certificate" on page 60

Note: The Control Station continues to generate a separate key set for the SSL-based connection between Celerra’s Apache web server (on behalf of Unisphere) and a user’s web browser. However, the Control Station now uses the CA key set to sign the Apache web server’s certificate, meaning the certificate is no longer self-signed. Installing Celerra Management Applications describes how to manage certificates for Unisphere.

Celerra Security Configuration Guide48 of 102 Release 6.0

Generate a key set and certificate request

To create the certificate provided by the persona to the Data Mover, you first generate the persona’s public/private key set with a request for a CA to sign the certificate. The CA can be an external CA or the Control Station.

Create a certificate signed by an external CA

Action

To generate a key set and request for a certificate to be signed by an external CA, use this command syntax:$ server_certificate <movername> -persona -generate {<persona_name> | id=<persona_id>} -key_size <bits> {-cn | -common_name} <common_name>

where:<movername> = name of the physical Data Mover with which the persona is associated.

<persona_name> = name of the persona.

<persona_id> = ID of the persona. The ID is generated when the persona is created. You can determine the ID through the -persona -list command.

<bits> = key size, either 2048 or 4096 bits.

<common_name> = commonly used name, typically a hostname that describes the Data Mover with which the persona is associated. If the name includes any special characters (such as a semi-colon, space character, or exclamation), it must be enclosed in quotation marks.

Note: Certificate requests are generated in PEM format only.

Example:

To generate a key set and request for a certificate to be signed by an external CA, type:

$ server_certificate server_2 -persona -generate default -key_size 4096 -cn ‘name;1.2.3.4’

Output

server_2 : Starting key generation. This could take a long time ... done

49 of 102Release 6.0Celerra Security Configuration Guide

Create a certificate signed by the Control Station

If you are using the Celerra’s Control Station to sign the certificate, you must specify the number of months the certificate is valid.

Create a certificate specifying detailed information about the persona

When you generate the persona’s public/private key set and certificate request, you can specify detailed information about the Data Mover. Typically this information includes details such as the organization that uses the Data Mover and where it is

Action

To generate a key set and request for a certificate to be signed by the Control Station, use this command syntax:$ server_certificate <movername> -persona -generate {<persona_name> | id=<persona_id>} -key_size <bits> -cs_sign_duration <# of months> {-cn | -common_name} <common_name>

where:<movername> = name of the physical Data Mover with which the persona is associated.

<persona_name> = name of the persona.

<persona_id> = ID of the persona. The ID is generated when the persona is created. You can determine the ID through the -persona -list command.

<bits> = key size, either 2048 or 4096 bits.

<# of months> = number of months the certificate is valid.

<common_name> = commonly used name, typically a hostname that describes the Data Mover with which the persona is associated. If the name includes any special characters (such as a semi-colon, space character, or exclamation), it must be enclosed in quotation marks.

Note: Certificate requests are generated in PEM format only.

Example:

To generate a key set and request for a certificate to be signed by the Control Station, type:

$ server_certificate server_2 -persona -generate default -key_size 4096 -cs_sign_duration 13 -cn ‘name;1.2.3.4’

Output

server_2 : Starting key generation. This could take a long time ... done

Celerra Security Configuration Guide50 of 102 Release 6.0

located. In addition, you have the option of saving the certificate request to a specific file.

Action

To generate a key set and request for a certificate signed by an external CA, specifying detailed information about the Data Mover and saving the certificate request to a specific file, use this command syntax:$ server_certificate <movername> -persona -generate {<persona_name> | id=<persona_id>} -key_size <bits> {-cn | -common_name} <common_name> -ou <org_unit> -organization <organization> -location <location> -state <state> -country <country> -filename <output_path>

where:<movername> = name of the physical Data Mover with which the persona is associated.

<persona_name> = name of the persona.

<persona_id> = ID of the persona. The ID is generated when the persona is created. You can determine the ID through the -persona -list command.

<bits> = key size, either 2048 or 4096 bits.

<common_name> = commonly used name, typically a hostname that describes the Data Mover with which the persona is associated. If the name includes any special characters (such as a semi-colon, space character, or exclamation), it must be enclosed in quotation marks.

<org_unit> = name of the organizational unit. If the name includes any special characters (such as a semi-colon, space character, or exclamation), it must be enclosed in quotation marks.

<organization> = name of the organization.

<location> = physical location of the organization.

<state> = state where the organization is located.

<country> = country where the organization is located.

<output_path> = name and path where the generated request are written.

Note: The -ou, -organization, -location, -state, and -country arguments are optional.

Note: The -filename argument is only valid if the certificate will be signed by an external CA.

Note: Certificate requests are generated in PEM format only.

Example:

To generate a key set and request for a certificate signed by an external CA, specifying detailed information about the Data Mover and saving the certificate request to a specific file, type:

$ server_certificate server_2 -persona -generate default -key_size 4096 -cn ‘name;1.2.3.4’ -ou ‘my.org;my dept’ -organization EMC -location Hopkinton -state MA -country US -filename /tmp/server_2.1.request.pem

Output

server_2 : Starting key generation. This could take a long time ... done

51 of 102Release 6.0Celerra Security Configuration Guide

Send the certificate request to the CA

Note: This task is not required if you are using the Control Station to sign the certificate. The Control Station automatically receives the certificate request.

If you are using an external CA to sign the certificate, a request to sign the public key is automatically generated along with the public/private key set. You must then send the certificate request to the CA.

Step Action

1. Display the persona’s properties to verify the content of the certificate request by using this command syntax:$ server_certificate <movername> -persona -info {-all | <persona_name> | id=<persona_id>}

where:<movername> = name of the physical Data Mover with which the persona is associated.

<persona_name> = name of the persona.

<persona_id> = ID of the persona. The ID is generated when the persona is created.

Example:

To display the properties for the default persona, including the certificate request, type:$ server_certificate server_2 -persona -info default

Output:

server_2 : id=1name=defaultnext state=Request Pending next certificate: request subject = CN=name;CN=1.2.3.4request: -----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----

2. If you have not already done so, save the certificate request to a file (for example, server_2.1.request.pem).

3. Send the.pem file to the CA using that company’s website or email.

Celerra Security Configuration Guide52 of 102 Release 6.0

Import a CA-signed certificate

Note: This task is not required if you are using the Control Station to sign the certificate. The Control Station automatically returns the signed certificate to the Data Mover.

You can import a signed certificate when the next signed certificate associated with the persona is available for download. As soon as the certificate is imported, it becomes the current certificate (assuming that the date is valid).

Step Action

1. Obtain the signed certificate (for example, cert.pem) from the CA.

2. Query all Data Movers to determine which personas are waiting for a signed certificate:$ server_certificate ALL -persona -list

Output:

server_2 : id=1name=defaultnext state=Request Pending request subject = CN=name;CN=1.2.3.4 server_3 : id=1name=defaultnext state=Request Pending request subject = CN=test;CN=5.6.7.8

3. To determine to which persona to import the certificate, match the certificate’s subject with the value of the Request Subject field for those personas whose Next State is Request Pending.

4. Import the signed certificate to the waiting persona by using this command syntax:$ server_certificate <movername> -persona -import {<persona_name> | id=<persona_id>}

where:<movername> = name of the physical Data Mover with which the persona is associated.

<persona_name> = name of the persona.

<persona_id> = ID of the persona. The ID is generated when the persona is created.

Note: The signed certificate can be in either DER or PEM format. You can only paste text in PEM format at the command prompt. If you specify -filename and provide a path, you can import a CA-signed certificate in either DER or PEM format.

Example:

To import the signed certificate, type:

$ server_certificate server_2 -persona -import default

Output:

server_2 : Please paste certificate data. Enter a carriage return and on the new line type ‘end of file’ or ‘eof’ followed by another carriage return.

Note: After the certificate text is pasted correctly, the system prompt is displayed.

53 of 102Release 6.0Celerra Security Configuration Guide

5. Verify that the certificate has been imported successfully by using this command syntax:$ server_certificate <movername> -persona -info {-all | <persona_name> | id=<persona_id>}

where:<movername> = name of the physical Data Mover with which the persona is associated.

<persona_name> = name of the persona.

<persona_id> = ID of the persona. The ID is generated when the persona is created.

Example:

To verify that the certificate for the default persona has been imported successfully, type:$ server_certificate server_2 -persona -info default

Output:

server_2id=1name=defaultnext state=Not Available Current Certificate: id = 1 subject = CN=name;CN=1.2.3.4 issuer = O=Celerra Certificate Authority;CN=eng173100 start date = 20070606183824Z end date = 20070706183824Z serial number = 05 signature alg. = sha1WithRSAEncryption public key alg. = rsaEncryption public key size = 4096 version = 3

Note: Typically, after a certificate is imported, it immediately becomes the current key set and certificate, and the Next State field is shown as Not Available. If the imported certificate is not valid (for example, its time stamp is several minutes or more ahead of the Data Mover), the imported key set and certificate remain the next key set and certificate, and the Next State field is shown as Available until such time as the key set and certificate become valid.

Step Action

Celerra Security Configuration Guide54 of 102 Release 6.0

List the available CA certificates

Acquire a CA certificate

If a new CA certificate is required and an external CA is being used, you can obtain the CA certificate from the company’s website or possibly from the person in your company responsible for security. If the CA is the Control Station (enterprise-level or inhouse), you can obtain the CA certificate from the person who manages the CA. Alternatively, you can display the text of the CA certificate through the nas_ca_certificate -display command.

Action

To display all the available CA certificates, type:$ server_certificate ALL -ca_certificate -list

Output

server_2 : id=1subject=C=ZA;ST=Western Cape;L=Cape Town;O=Thawte Consulting cc;OU=Certificissuer=C=ZA;ST=Western Cape;L=Cape Town;O=Thawte Consulting cc;OU=Certificaexpire=20201231235959Z

id=2subject=C=US;O=America Online Inc.;CN=America Online Root Certification Autissuer=C=US;O=America Online Inc.;CN=America Online Root Certification Authexpire=20371119204300Z

id=3subject=C=US;ST=Massachusetts;L=Westboro;O=EMC;OU=IS;OU=Terms of use at wwwissuer=O=VeriSign Trust Network;OU=VeriSign, Inc.;OU=VeriSign Internationalexpire=20080620235959Z

id=4subject=C=US;O=VeriSign,Inc.;OU=Class 3 Public Primary Certification Authorissuer=C=US;O=VeriSign, Inc.;OU=Class 3 Public Primary Certification Authorexpire=20280801235959Z

Action

To display the Control Station’s CA certificate, type:$ /nas/sbin/nas_ca_certificate -display

Note: The certificate text is displayed on the terminal screen. Alternatively, you can redirect it to a file. The certificate text is enclosed by BEGIN CERTIFICATE and END CERTIFICATE.

55 of 102Release 6.0Celerra Security Configuration Guide

Output

Certificate: Data: Version: 3 (0x2) Serial Number: 3 (0x3) Signature Algorithm: sha1WithRSAEncryption Issuer: O=Celerra Certificate Authority, CN=eng173100 Validity Not Before: Mar 23 21:07:40 2007 GMT Not After : Mar 21 21:07:40 2012 GMT Subject: O=Celerra Certificate Authority, CN=eng173100 Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): 00:da:b2:37:86:05:a3:73:d5:9a:04:ba:db:05:97: d2:12:fe:1a:79:06:19:eb:c7:2c:c2:51:93:7f:7a: 93:59:37:63:1e:53:b3:8d:d2:7f:f0:e3:49:42:22: f4:26:9b:b4:e4:a6:40:6d:8d:e7:ea:07:8e:ca:b7: 7e:88:71:9d:11:27:5a:e3:57:16:03:a7:ee:19:25: 07:d9:42:17:b4:eb:e6:97:61:13:54:62:03:ec:93: b7:e6:f1:7f:21:f0:71:2d:c4:8a:8f:20:d1:ab:5a: 6a:6c:f1:f6:2f:26:8c:39:32:93:93:67:bb:03:a7: 22:29:00:11:e0:a1:12:4b:02:79:fb:0f:fc:54:90: 30:65:cd:ea:e6:84:cc:91:fe:21:9c:c1:91:f3:17: 1e:44:7b:6f:23:e9:17:63:88:92:ea:80:a5:ca:38: 9a:b3:f8:08:cb:32:16:56:8b:c4:f7:54:ef:75:db: 36:7e:cf:ef:75:44:11:69:bf:7c:06:97:d1:87:ff: 5f:22:b5:ad:c3:94:a5:f8:a7:69:21:60:5a:04:5e: 00:15:04:77:47:03:ec:c5:7a:a2:bf:32:0e:4d:d8: dc:44:fa:26:39:16:84:a7:1f:11:ef:a3:37:39:a6: 35:b1:e9:a8:aa:a8:4a:72:8a:b8:c4:bf:04:70:12: b3:31 Exponent: 65537 (0x10001)

Celerra Security Configuration Guide56 of 102 Release 6.0

Output

X509v3 extensions: X509v3 Subject Key Identifier: 35:06:F2:FE:CC:21:4B:92:DA:74:C9:47:CE:BB:37:21:5E:04:E2:E6 X509v3 Authority Key Identifier: keyid:35:06:F2:FE:CC:21:4B:92:DA:74:C9:47:CE:BB:37:21:5E:04:E2:E6 DirName:/O=Celerra Certificate Authority/CN=eng173100 serial:00X509v3 Basic Constraints: CA:TRUE X509v3 Subject Alternative Name: DNS:eng173100 Signature Algorithm: sha1WithRSAEncryption 09:c3:13:26:16:be:44:56:82:5d:0e:63:07:19:28:f3:6a:c4: f3:bf:93:25:85:c3:55:48:4e:07:84:1d:ea:18:cf:8b:b8:2d: 54:13:25:2f:c9:75:c1:28:39:88:91:04:df:47:2c:c0:8f:a4: ba:a6:cd:aa:59:8a:33:7d:55:29:aa:23:59:ab:be:1d:57:f6: 20:e7:2b:68:98:f2:5d:ed:58:31:d5:62:85:5d:6a:3f:6d:2b: 2d:f3:41:be:97:3f:cf:05:8b:7e:f5:d7:e8:7c:66:b2:ea:ed: 58:d4:f0:1c:91:d8:80:af:3c:ff:14:b6:e7:51:73:bb:64:84: 26:95:67:c6:60:32:67:c1:f7:66:f4:79:b5:5d:32:33:3c:00: 8c:75:7d:02:06:d3:1a:4e:18:0b:86:78:24:37:18:20:31:61: 59:dd:78:1f:88:f8:38:a0:f4:25:2e:c8:85:4f:ce:8a:88:f4: 4f:12:7e:ee:84:52:b4:91:fe:ff:07:6c:32:ca:41:d0:a6:c0: 9d:8f:cc:e8:74:ee:ab:f3:a5:b9:ad:bb:d7:79:67:89:34:52: b4:6b:39:db:83:27:43:84:c3:c3:ca:cd:b2:0c:1d:f5:20:de: 7a:dc:f0:1f:fc:70:5b:71:bf:e3:14:31:4c:7e:eb:b5:11:9c: 96:bf:fe:6f-----BEGIN CERTIFICATE-----MIIDoDCCAoigAwIBAgIBAzANBgkqhkiG9w0BAQUFADA8MSYwJAYDVQQKEx1DZWxlcnJhIENlcnRpZmljYXRlIEF1dGhvcml0eTESMBAGA1UEAxMJZW5nMTczMTAwMB4XDTA3MDMyMzIxMDc0MFoXDTEyMDMyMTIxMDc0MFowPDEmMCQGA1UEChMdQ2VsZXJyYSBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxEjAQBgNVBAMTCWVuZzE3MzEwMDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANqyN4YFo3PVmgS62wWX0hL+GnkGGevHLMJRk396k1k3Yx5Ts43Sf/DjSUIi9CabtOSmQG2N5+oHjsq3fohxnREnWuNXFgOn7hklB9lCF7Tr5pdhE1RiA+yTt+bxfyHwcS3Eio8g0ataamzx9i8mjDkyk5NnuwOnIikAEeChEksCefsP/FSQMGXN6uaEzJH+IZzBkfMXHkR7byPpF2OIkuqApco4mrP4CMsyFlaLxPdU73XbNn7P73VEEWm/fAaX0Yf/XyK1rcOUpfinaSFgWgReABUEd0cD7MV6or8yDk3Y3ET6JjkWhKcfEe+jNzmmNbHpqKqoSnKKuMS/BHASszECAwEAAaOBrDCBqTAdBgNVHQ4EFgQUNQby/swhS5LadMlHzrs3IV4E4uYwZAYDVR0jBF0wW4AUNQby/swhS5LadMlHzrs3IV4E4uahQKQ+MDwxJjAkBgNVBAoTHUNlbGVycmEgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MRIwEAYDVQQDEwllbmcxNzMxMDCCAQAwDAYDVR0TBAUwAwEB/zAUBgNVHREEDTALggllbmcxNzMxMDAwDQYJKoZIhvcNAQEFBQADggEBAAnDEyYWvkRWgl0OYwcZKPNqxPO/kyWFw1VITgeEHeoYz4u4LVQTJS/JdcEoOYiRBN9HLMCPpLqmzapZijN9VSmqI1mrvh1X9iDnK2iY8l3tWDHVYoVdaj9tKy3zQb6XP88Fi3711+h8ZrLq7VjU8ByR2ICvPP8UtudRc7tkhCaVZ8ZgMmfB92b0ebVdMjM8AIx1fQIG0xpOGAuGeCQ3GCAxYVndeB+I+Dig9CUuyIVPzoqI9E8Sfu6EUrSR/v8HbDLKQdCmwJ2PzOh07qvzpbmtu9d5Z4k0UrRrOduDJ0OEw8PKzbIMHfUg3nrc8B/8cFtxv+MUMUx+67URnJa//m8=-----END CERTIFICATE-----

57 of 102Release 6.0Celerra Security Configuration Guide

Import a CA certificate

To make the CA certificate known to the Data Movers, you must import it. You can provide a path and import a file or cut and paste the text.

Generate a new Control Station CA certificate

Note: This task is required only if the CA key set has been compromised or the CA certificate expires. The initial Control Station CA certificate is generated during a Celerra software 5.6 installation or upgrade.

You must be the root user to issue this command.

Action

To import a CA certificate, use this command syntax:$ server_certificate <movername> -ca_certificate -import [-filename <path>]

where:<movername> = name of the physical Data Mover with which the CA certificate is associated

<path> = location of the file to be imported

Note: The CA certificate can be in either DER or PEM format. You can only paste text in PEM format at the command prompt. If you specify -filename and provide a path, you can import a CA certificate in either DER or PEM format.

Example:

To import a CA certificate, type:$ server_certificate server_2 -ca_certificate -import

Output

server_2 : Please paste certificate data. Enter a carriage return and on the new line type ‘end of file’ or ‘eof’ followed by another carriage return.

Note

After the certificate text is pasted correctly, the system prompt is displayed.

Action

To generate a new key set and certificate for the Control Station, type:# /nas/sbin/nas_ca_certificate -generate

Note: By default, this certificate is valid for 5 years from the date it is generated and the certificate’s name is the Control Station’s hostname.

Celerra Security Configuration Guide58 of 102 Release 6.0

Display the certificate

Display the text of the Control Station CA certificate so you can copy it for distribution to network clients.

Output

New keys and certificate were successfully generated.

Action

To display the Control Station’s CA certificate, type:$ /nas/sbin/nas_ca_certificate -display

Note: The certificate text is displayed on the terminal screen. Alternatively, you can redirect it to a file.

Output

Certificate: Data: Version: 3 (0x2) Serial Number: 3 (0x3) Signature Algorithm: sha1WithRSAEncryption Issuer: O=Celerra Certificate Authority, CN=eng173100 Validity Not Before: Mar 23 21:07:40 2007 GMT Not After : Mar 21 21:07:40 2012 GMT Subject: O=Celerra Certificate Authority, CN=eng173100 Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): 00:da:b2:37:86:05:a3:73:d5:9a:04:ba:db:05:97: d2:12:fe:1a:79:06:19:eb:c7:2c:c2:51:93:7f:7a: 93:59:37:63:1e:53:b3:8d:d2:7f:f0:e3:49:42:22: f4:26:9b:b4:e4:a6:40:6d:8d:e7:ea:07:8e:ca:b7: 7e:88:71:9d:11:27:5a:e3:57:16:03:a7:ee:19:25: 07:d9:42:17:b4:eb:e6:97:61:13:54:62:03:ec:93: b7:e6:f1:7f:21:f0:71:2d:c4:8a:8f:20:d1:ab:5a: 6a:6c:f1:f6:2f:26:8c:39:32:93:93:67:bb:03:a7: 22:29:00:11:e0:a1:12:4b:02:79:fb:0f:fc:54:90: 30:65:cd:ea:e6:84:cc:91:fe:21:9c:c1:91:f3:17: 1e:44:7b:6f:23:e9:17:63:88:92:ea:80:a5:ca:38: 9a:b3:f8:08:cb:32:16:56:8b:c4:f7:54:ef:75:db: 36:7e:cf:ef:75:44:11:69:bf:7c:06:97:d1:87:ff: 5f:22:b5:ad:c3:94:a5:f8:a7:69:21:60:5a:04:5e: 00:15:04:77:47:03:ec:c5:7a:a2:bf:32:0e:4d:d8: dc:44:fa:26:39:16:84:a7:1f:11:ef:a3:37:39:a6: 35:b1:e9:a8:aa:a8:4a:72:8a:b8:c4:bf:04:70:12: b3:31 Exponent: 65537 (0x10001)

59 of 102Release 6.0Celerra Security Configuration Guide

Output

X509v3 extensions: X509v3 Subject Key Identifier: 35:06:F2:FE:CC:21:4B:92:DA:74:C9:47:CE:BB:37:21:5E:04:E2:E6 X509v3 Authority Key Identifier: keyid:35:06:F2:FE:CC:21:4B:92:DA:74:C9:47:CE:BB:37:21:5E:04:E2:E6 DirName:/O=Celerra Certificate Authority/CN=eng173100 serial:00X509v3 Basic Constraints: CA:TRUE X509v3 Subject Alternative Name: DNS:eng173100 Signature Algorithm: sha1WithRSAEncryption 09:c3:13:26:16:be:44:56:82:5d:0e:63:07:19:28:f3:6a:c4: f3:bf:93:25:85:c3:55:48:4e:07:84:1d:ea:18:cf:8b:b8:2d: 54:13:25:2f:c9:75:c1:28:39:88:91:04:df:47:2c:c0:8f:a4: ba:a6:cd:aa:59:8a:33:7d:55:29:aa:23:59:ab:be:1d:57:f6: 20:e7:2b:68:98:f2:5d:ed:58:31:d5:62:85:5d:6a:3f:6d:2b: 2d:f3:41:be:97:3f:cf:05:8b:7e:f5:d7:e8:7c:66:b2:ea:ed: 58:d4:f0:1c:91:d8:80:af:3c:ff:14:b6:e7:51:73:bb:64:84: 26:95:67:c6:60:32:67:c1:f7:66:f4:79:b5:5d:32:33:3c:00: 8c:75:7d:02:06:d3:1a:4e:18:0b:86:78:24:37:18:20:31:61: 59:dd:78:1f:88:f8:38:a0:f4:25:2e:c8:85:4f:ce:8a:88:f4: 4f:12:7e:ee:84:52:b4:91:fe:ff:07:6c:32:ca:41:d0:a6:c0: 9d:8f:cc:e8:74:ee:ab:f3:a5:b9:ad:bb:d7:79:67:89:34:52: b4:6b:39:db:83:27:43:84:c3:c3:ca:cd:b2:0c:1d:f5:20:de: 7a:dc:f0:1f:fc:70:5b:71:bf:e3:14:31:4c:7e:eb:b5:11:9c: 96:bf:fe:6f-----BEGIN CERTIFICATE-----MIIDoDCCAoigAwIBAgIBAzANBgkqhkiG9w0BAQUFADA8MSYwJAYDVQQKEx1DZWxlcnJhIENlcnRpZmljYXRlIEF1dGhvcml0eTESMBAGA1UEAxMJZW5nMTczMTAwMB4XDTA3MDMyMzIxMDc0MFoXDTEyMDMyMTIxMDc0MFowPDEmMCQGA1UEChMdQ2VsZXJyYSBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxEjAQBgNVBAMTCWVuZzE3MzEwMDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANqyN4YFo3PVmgS62wWX0hL+GnkGGevHLMJRk396k1k3Yx5Ts43Sf/DjSUIi9CabtOSmQG2N5+oHjsq3fohxnREnWuNXFgOn7hklB9lCF7Tr5pdhE1RiA+yTt+bxfyHwcS3Eio8g0ataamzx9i8mjDkyk5NnuwOnIikAEeChEksCefsP/FSQMGXN6uaEzJH+IZzBkfMXHkR7byPpF2OIkuqApco4mrP4CMsyFlaLxPdU73XbNn7P73VEEWm/fAaX0Yf/XyK1rcOUpfinaSFgWgReABUEd0cD7MV6or8yDk3Y3ET6JjkWhKcfEe+jNzmmNbHpqKqoSnKKuMS/BHASszECAwEAAaOBrDCBqTAdBgNVHQ4EFgQUNQby/swhS5LadMlHzrs3IV4E4uYwZAYDVR0jBF0wW4AUNQby/swhS5LadMlHzrs3IV4E4uahQKQ+MDwxJjAkBgNVBAoTHUNlbGVycmEgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MRIwEAYDVQQDEwllbmcxNzMxMDCCAQAwDAYDVR0TBAUwAwEB/zAUBgNVHREEDTALggllbmcxNzMxMDAwDQYJKoZIhvcNAQEFBQADggEBAAnDEyYWvkRWgl0OYwcZKPNqxPO/kyWFw1VITgeEHeoYz4u4LVQTJS/JdcEoOYiRBN9HLMCPpLqmzapZijN9VSmqI1mrvh1X9iDnK2iY8l3tWDHVYoVdaj9tKy3zQb6XP88Fi3711+h8ZrLq7VjU8ByR2ICvPP8UtudRc7tkhCaVZ8ZgMmfB92b0ebVdMjM8AIx1fQIG0xpOGAuGeCQ3GCAxYVndeB+I+Dig9CUuyIVPzoqI9E8Sfu6EUrSR/v8HbDLKQdCmwJ2PzOh07qvzpbmtu9d5Z4k0UrRrOduDJ0OEw8PKzbIMHfUg3nrc8B/8cFtxv+MUMUx+67URnJa//m8=-----END CERTIFICATE-----

Celerra Security Configuration Guide60 of 102 Release 6.0

Distribute the Control Station CA certificate

You must make the Control Station CA certificate available so it can be imported by network clients and used to recognize certificates sent by Data Movers signed by this Control Station.

Step Action

1. Save the Control Station CA certificate text to a file (for example, cs_ca_cert.crt).

2. Make this.crt file available to network clients through an appropriate mechanism (FTP or email).

3. Regenerate a new key set and certificate request and import a signed certificate for any personas whose certificates are signed by the Control Station. "Creating the certificate provided by the persona" on page 47 describes this procedure.

4. If a Data Mover is a client to another Data Mover, import the new CA certificate to the appropriate Data Mover. "Obtaining CA certificates" on page 47 describes this procedure.

61 of 102Release 6.0Celerra Security Configuration Guide

Managing PKI

"Planning considerations for Public Key Infrastructure" on page 30 provides a general description of this feature.

The tasks to manage the persona key sets and certificates are:

◆ "Display key set and certificate properties" on page 61

◆ "Check for expired key sets" on page 62

◆ "Clear key sets" on page 62

The tasks to manage the CA certificate are:

◆ "Display CA certificate properties" on page 63

◆ "Check for expired CA certificates" on page 63

◆ "Delete CA certificates" on page 64

Display key set and certificate properties

Action

To display the properties of a key set and certificate, use this command syntax:$ server_certificate <movername> -persona -info {-all | <persona_name> | id=<persona_id>}

where:<movername> = name of the physical Data Mover with which the persona is associated.

<persona_name> = name of the persona.

<persona_id> = ID of the persona. The ID is generated when the persona is created.

Example:

To display the key set and certificate for the persona named default, type:$ server_certificate server_2 -persona -info default

Output

server_2 : id=1 name=default next state=Not Available CURRENT CERTIFICATE: id = 1 subject = CN=test;CN=1.2.3.4 issuer = O=Celerra Certificate Authority;CN=eng173100 start date = 20070606183824Z end date = 20070706183824Z serial number = 05 signature alg. = sha1WithRSAEncryption public key alg. = rsaEncryption public key size = 4096 version = 3

Celerra Security Configuration Guide62 of 102 Release 6.0

Check for expired key sets

There is no automated way to check for expired key sets and certificates. Instead you must check for expired certificates by listing the personas and examining the expiration dates of the certificates associated with each persona.

Clear key sets

You should clear a key set when it has expired, the service is not longer needed, or the certificate request will not be fulfilled. You can clear a persona’s current key set and certificate, the next key set and certificate, or both.

Action

To list all the key sets and certificates that are currently available, type:$ server_certificate ALL -persona -list

Output

server_2 : id=1 name=default next state=Request Pending request subject=CN=name;CN=1.2.3.4server_3 : id=1 name=default next state=Not Available CURRENT CERTIFICATE: id=1 subject=CN=test;CN=1.2.3.4 expire=20070608183824Z issuer=O=Celerra Certificate Authority;CN=eng173100

Note

A current certificate’s expiration date is listed in the Expire field. 20070608183824Z translates to Fri June 08 18:38:24 GMT 2007.

Action

To clear a key set and the associated certificate, use this command syntax:$ server_certificate <movername> -persona -clear {<persona_name> | id=<persona_id>} {-next | -current | -both}

where:<movername> = name assigned to the physical Data Mover with which the persona is associated.

<persona_name> = name of the persona.

<persona_id> = ID of the persona. The ID is generated when the persona is created.

Example:

To clear both the current and next key set and certificate for the persona on server_2, type:$ server_certificate server_2 -persona -clear default -both

63 of 102Release 6.0Celerra Security Configuration Guide

Display CA certificate properties

Check for expired CA certificates

There is no automated way to check for expired CA certificates. Instead you must check for expired certificates by listing the CA certificates and examining the expiration dates.

Output

server_2 : done

Action

To display the properties of a CA certificate, use this command syntax:$ server_certificate <movername> -ca_certificate -info {-all | <certificate_id>}

where:<movername> = name of the physical Data Mover with which the CA certificate is associated.

<certificate_id> = ID of the certificate.

Note: Use the -all option to display the properties of all the CA certificates available to the Data Mover.

Example:

To display the properties of the CA certificate identified by certificate ID 2, type:$ server_certificate server_2 -ca_certificate -info 2

Output

server_2 :id=2subject = C=US;O=VeriSign, Inc.;OU=Class 3 Public Primary Certification Authorityissuer = C=US;O=VeriSign, Inc.;OU=Class 3 Public Primary Certification Authoritystart = 19960129000000Zexpire = 20280801235959Zsignature alg. = md2WithRSAEncryptionpublic key alg. = rsaEncryptionpublic key size = 2048 bitsserial number = 70ba e41d 10d9 2934 b638 ca7b 03cc babfversion = 1

Action

To list all the CA certificates that are currently available, type:$ server_certificate ALL -ca_certificate -list

Celerra Security Configuration Guide64 of 102 Release 6.0

Delete CA certificates

You should delete a CA certificate when it has expired, been compromised, or is no longer needed for authenticating a server.

Output

server_2 :id=1subject=O=Celerra Certificate Authority;CN=sorentoissuer=O=Celerra Certificate Authority;CN=sorentoexpire=20120318032639Zid=2subject=C=US;O=VeriSign, Inc.;OU=Class 3 Public Primary Certification Authorissuer=C=US;O=VeriSign, Inc.;OU=Class 3 Public Primary Certification Authorexpire=20280801235959Z

server_3 :id=1subject=O=Celerra Certificate Authority;CN=zeus-csissuer=O=Celerra Certificate Authority;CN=zeus-csexpire=20120606181215Z

Note

A certificate’s expiration date is listed in the Expire field. 20120318032639Z translates to March 18 03:26:39 GMT 2012.

Action

To delete a CA certificate, use this command syntax:$ server_certificate <movername> -ca_certificate -delete {-all | <certificate_id>}

where:<movername> = name of the physical Data Mover with which the CA certificate is associated.

<certificate_id> = ID of the certificate. You can determine the ID through the -ca_certificate -list command.

Note: Use the -all option to delete all the CA certificates available to the Data Mover.

Example:

To delete the CA certificate on server_2 identified by its ID number, type:$ server_certificate server_2 -ca_certificate -delete 1

Output

server_2 : done

65 of 102Release 6.0Celerra Security Configuration Guide

Troubleshooting

As part of an effort to continuously improve and enhance the performance and capabilities of its product lines, EMC periodically releases new versions of its hardware and software. Therefore, some functions described in this document may not be supported by all revisions of the software or hardware currently in use. For the most up-to-date information on product features, refer to your product release notes.

If a product does not function properly or does not function as described in this document, please contact your EMC representative.

Where to get help

Product information – For documentation, release notes, software updates, or for information about EMC products, licensing, and service, go to the EMC Powerlink

website (registration required) at http://Powerlink.EMC.com.

Troubleshooting – For troubleshooting information, go to Powerlink, search for Celerra Tools, and select Celerra Troubleshooting from the navigation panel on the left.

Technical support – For technical support, go to Powerlink and choose Support. On the Support page, you can access Support Forums, request a product enhancement, talk directly to an EMC representative, or open a service request. To open a service request, you must have a valid support agreement. Please contact you EMC sales representative for details about obtaining a valid support agreement or to answer any questions about your account.

Note: Do not request a specific support representative unless one has already been assigned to your particular system problem.

Problem Resolution Roadmap for Celerra contains additional information about using Powerlink and resolving problems.

EMC E-Lab Interoperability Navigator

The EMC E-LabTM Interoperability Navigator is a searchable, web-based application that provides access to EMC interoperability support matrices. It is available at http://Powerlink.EMC.com. After logging in to Powerlink, go to Support > Interoperability and Product Lifecycle Information > E-Lab Interoperability Navigator.

Troubleshooting the Control Station connection to a LDAP-based directory server

Testing the Control Station connection to a LDAP-based directory server

You can verify that the Control Station’s connection to an LDAP-based directory server is functioning by selecting Test on Settings > User Management (User

Celerra Security Configuration Guide66 of 102 Release 6.0

Management tasks) > Manage LDAP Domain. If you have specified both a primary and backup directory server, both connections are tested together.

Note: A backup directory server must support all the same domain settings as the primary directory server.

If one directory server cannot be accessed successfully, the Test function will report which connection attempt failed. Failure indicates that binding credentials, user or group attributes and search paths are incorrect.

Note: The user account (also known as the bind distinguished name) that Celerra uses to bind to the LDAP service must exist on the directory server.

Creating the user account that binds to the LDAP-based directory service

EMC recommends that the user account used to bind to the LDAP-based directory service be as restricted as possible (such as an account whose primary group is Domain Guests). If the user account fails to bind to the directory service, check the following:

1. Verify that the GPO User Rights Assignment does not include guests in the list of users denied access to the domain controller from the network.

2. In those environments in which guests are blocked from connecting to domain controllers, the user account’s primary group may need to be Domain Users rather than Domain Guests.

3. If access problems persist, a more privileged user account must be used.

Ensure that the account chosen has read/search privileges for the directory.

Setting up the SSL session

For the SSL session to be created successfully, the following configuration tasks must have been performed correctly:

◆ The certificate uploaded to the Control Station must be the public certificate from the CA that signed the LDAP-based directory server’s SSL server certificate. The Control Station uses this CA certificate to verify the certificate received from the LDAP server.

◆ The hostname of the LDAP-based directory server (specified in the Primary and Backup fields on Settings > User Management (User Management tasks) > Manage LDAP Domain) and the common name provided in the directory server’s certificate must match. The value you specify depends on the format of the subject in the directory server’s certificate; typically the subject is indicated by its hostname although it may be the IP address.

Troubleshooting local user accounts

Enabling a disabled account by changing its password

Unisphere, like the Linux operating system, enables a previously disabled local user account if you change the password for that user account. Other changes to a disabled user account do not result in the account being enabled.

67 of 102Release 6.0Celerra Security Configuration Guide

Disabling your user account

If you disable your own account while logged in (using Settings > User Management > Users > Disable):

◆ If you are logged in to Unisphere and attempt to perform any additional operations, you will receive the error "User is not allowed to perform this operation".

◆ If you are logged in to the Celerra CLI when you disable your account, you can continue to perform additional operations. However, once you log out, you will not be able to log in again.

Using local user accounts

Celerra provides the ability to create strictly local user accounts and domain-mapped local user accounts.

You should use a local user account to log in directly to a specific Celerra. This type of local user account is relevant only to the Celerra on which it was created and is used to manage that one Celerra.

The local user accounts created for domain users provide the mechanism for verifying that a user authenticated by an external directory server is authorized to access the Celerra Network Server and that it has the necessary local credentials, including a UID, to perform tasks. You should use a domain account to remotely access and manage multiple Celerras, avoiding the need to configure individual user accounts on each Celerra you manage.

Important: Do not use the local name of a domain-mapped account to log in to Celerra.

If you change an existing local user account to a domain-mapped user account, you must first create a domain-mapped group (if a domain-mapped group does not already exist) to which you can make the user a member. Otherwise, the user will be unable to log in to Celerra.

Cleaning up out-of-date local user accounts

In certain circumstances, you may need to manually delete out-of-date local user accounts from the Celerra. This problem only occurs when usernames are exactly alike. For example, a user Jennifer Smith has a domain-mapped local user account named JSmith. Subsequently Jennifer adopts her married name and her user account on the directory server is changed to JBrown, resulting in a new domain-mapped local user account. But when a new user Joshua Smith is created on the directory server with username JSmith and is mapped to the Celerra, he is assigned the existing local user account JSmith and is given the privileges previously assigned to Jennifer.

EMC recommends that on the directory server you avoid the reuse of usernames for different physical users. If such reuse is unavoidable, then to prevent the potentially problematic situation described above, you must use Unisphere to do one of the following:

◆ In the case where a Celerra administrator’s directory username is changed, manually change the local username and domain username in the domain-mapped local user account.

Celerra Security Configuration Guide68 of 102 Release 6.0

◆ In the case where a Celerra administrator’s account is removed from the directory server, manually delete the domain-mapped local user account and home directory.

Understanding how local user account names are created

When a local user account is automatically mapped from a domain user, Celerra assigns it a name based on both the user's directory server name and the domain name. If the username contains spaces, these spaces are removed.

Understanding defunct storage domain user accounts

If you remove a Celerra from a storage domain, the local user account mapped from the storage domain global user is marked defunct and can no longer be used to login. Even if the Celerra rejoins the storage domain with the same user account, the original local user account cannot be reenabled. Celerra maintains defunct accounts for auditing purposes. You can delete this account if you choose.

Troubleshooting domain-mapped user accounts

When a domain-mapped user logs in to the Control Station, the domain name provided must match the domain name or fully qualified domain name known to Celerra. (In the case of a LDAP domain-mapped user, this is the domain name defined on Settings > User Management (User Management tasks) > Manage LDAP Domain.) Otherwise, the user will be unable to log in.

The supported domain-mapped user login formats for LDAP domain-mapped users are:

◆ <domain name>\<user> (for example, mycompany\anne)

◆ <user>@<domain name> (for example, anne@mycompany)

The supported domain-mapped user login formats for storage domain-mapped users are:

◆ <CLARiiON domain name>\<user> (for example, mycompany\anne)

◆ <user>@<CLARiiON domain name> (for example, anne@mycompany)

The domain name can be specified as the fully qualified domain name. For example:

◆ <fully qualified domain name>\<user> (for example, mycompany.com\anne)

◆ <user>@<fully qualified domain name> (for example, [email protected])

Note: Users can only log in under a single domain. Consequently, mycompany and mycompany.com are treated as the same domain.

Troubleshooting certificate imports

Certificates are used by both the Data Mover and Control Station to identify one or both ends of a SSL-enabled connection. The Data Mover can import certificates encoded using Distinguished Encoding Rules (DER) format, also known as binary-encoded X.509, or Privacy Enhanced Mail (PEM) format, also known as Base64-encoded X.509. The Control Station can import certificates encoded using PEM format.

69 of 102Release 6.0Celerra Security Configuration Guide

A certificate file in DER format is composed of binary data. PEM format uses Base64 encoding to transform binary text to ASCII text, translating each 6 bits to a specific ASCII character and enclosing the certificate text (up to 64 characters) in the lines BEGIN CERTIFICATE and END CERTIFICATE. Depending on the source of the certificate file, the PEM-encoded certificate may be preceded by other text that lists the contents of the certificate. The translation of binary text into text prevents data from being modified in transit between systems, such as through email.

Importing a certificate into the Data Mover

Attempting to import an expired certificate

If you receive an error when importing a certificate, verify that the certificate’s “valid to” date and time have not already passed. An expired certificate cannot be imported into the Data Mover.

Importing a DER-encoded certificate

If you receive an error when importing a DER-encoded certificate into a Data Mover, check the following:

◆ Verify that the certificate is valid by using a tool such as OpenSSL or Microsoft Certificate Server. To use these tools, the file must have a valid extension such as .der, .cer, or .crt.

◆ If the certificate is not valid, that is, the tool reports an error, the certificate file is probably corrupted and must be replaced with an uncorrupted copy.

◆ If the certificate is valid, use the tool to export the certificate in PEM format, verify that the PEM-encoded certificate is valid, and import the PEM version of the certificate.

Importing a PEM-encoded certificate

If you receive an error when importing a PEM-encoded certificate into a Data Mover, check the following:

◆ Verify that the certificate file’s PEM format is correct.

◆ Verify that the certificate is valid by using a tool such as OpenSSL or Microsoft Certificate Server. If the certificate is not valid, that is, the tool reports an error, the certificate file is probably corrupted and must be replaced with an uncorrupted copy.

Importing a certificate into the Control Station

Checking for out-of-date certificates

The Control Station does not return an error if you upload an expired certificate. But the Control Station will not use an out-of-date certificate to verify the certificate received from the LDAP-based directory server.

You can determine the expiration date of the currently installed certificate by viewing the certificate’s properties in the SSL Certificate field.

Determining if certificate chaining is used

To increase security, some organizations use CA certificate chaining. Certificate chaining links two or more CA certificates together. The primary CA certificate is the

Celerra Security Configuration Guide70 of 102 Release 6.0

root certificate at the end of the CA certificate chain. Since Celerra needs the complete certificate chain to verify the authenticity of a certificate that is received, ask the directory server administrator if certificate chaining is used. If so, you must concatenate all the relevant certificates into a single file and upload that version. The certificate must be in PEM/Base64 encoded format and use the suffix .cer.

Error messages

All new event, alert, and status messages provide detailed information and recommended actions to help you troubleshoot the situation.

To view message details, use any of the following methods:

◆ Unisphere software:

• Right-click on an event, alert, or status message and select to view Event Details, Alert Details, or Status Details.

◆ Celerra CLI:

• Use the nas_message -info <message_id> command to retrieve the detailed information for a particular error.

◆ Celerra Network Server Error Messages Guide:

• Use this guide to locate information about messages that are in the earlier-release message format.

◆ Powerlink:

• Use the text from the error message’s brief description to search the Knowledgebase on Powerlink. After logging in to Powerlink, go to Support > Search Support.

Training and Professional Services

EMC Customer Education courses help you learn how EMC storage products work together within your environment in order to maximize your entire infrastructure investment. EMC Customer Education features online and hands-on training in state-of-the-art labs conveniently located throughout the world. EMC customer training courses are developed and delivered by EMC experts. Go to EMC Powerlink at http://Powerlink.EMC.com for course and registration information.

EMC Professional Services can help you implement your Celerra Network Server efficiently. Consultants evaluate your business, IT processes, and technology and recommend ways you can leverage your information for the most benefit. From business plan to implementation, you get the experience and expertise you need, without straining your IT staff or hiring and training new personnel. Contact your EMC representative for more information.

71 of 102Release 6.0Celerra Security Configuration Guide

Appendix A: CLI role-based access setup

A user account is always associated with a primary group and each group is assigned a role. A role defines the privileges (that is, the operations) the user can perform on a particular Celerra object.

Defining role-based access for commands. This appendix provides information about how to set up role-based access for CLI commands. The first four tables list the CLI commands for which you can specify the privileges needed to perform different command actions. The object on which privileges are defined and the specific command actions available when Modify or Full Control privileges are selected are listed for each command. Using this information you can create a custom role (also known as a user role) that gives a user associated with this role exactly the privileges necessary to perform the job. Or you can associate a user with the predefined role that already includes Full Control privileges for the command. Table 9 on page 72 lists the commands with the prefix cel. Table 10 on page 72 lists the commands with the prefix fs. Table 11 on page 73 lists the commands with the prefix nas. Table 12 on page 75 lists the commands with the prefix server.

You create and manage role-based user access with Settings > User Management > Roles. You can find a description of this feature in Unisphere online help. You must be root or a user who has root or security operator privileges to create a user account and to associate it with a group and role.

Read-only privileges. Regardless of the role with which the user is associated, a user always has read-only privileges for all commands and command options that display information. Some of the command actions available with read-only privileges include info, list, status, and verify. Table 13 on page 78 lists commands that users associated with any role can execute.

Commands not covered by the role-based access feature. Table 14 on page 78 lists the commands that are not covered by the role-based access feature. Some of these commands invoke scripts, others are based on legacy executables, and others are associated with Celerra objects that are not exposed. If the Celerra object associated with a command is not exposed in Settings > User Management > Roles > Create, you cannot create a custom (user) role that allows you to specify the privileges needed to perform different command actions. Consequently, these commands can only be performed by the default user accounts root and nasadmin or, in some cases, by a user account associated with the root and nasadmin roles.

"Planning considerations for role-based user access" on page 25 describes the concepts behind this feature.

Celerra Security Configuration Guide72 of 102 Release 6.0

Table 9 cel commands

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Command Object category Actions available with modify privileges

Actions available with full control privileges

Included in predefined role

cel_fs Storage>File Systems extractimport

storage adminfilemover application

Table 10 fs commands

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Command Object categoryActions available with modify privileges

Actions available with full control privileges

Included in predefined role

fs_ckpt Data Protection>Checkpoints modifyrefresh

createrestore

backup operator

fs_dhsm Storage>FileMover connection modifymodify

connection create delete

storage adminfilemover application

fs_group Storage>File Systems createdeleteshrinkxtend

storage adminfilemover application

fs_rdf Storage>Storage Systems infomirrorrestore

storage admin

fs_timefinder Storage>File Systems mirror off on refreshrestoresnapshot

storage admin

73 of 102Release 6.0Celerra Security Configuration Guide

Table 11 nas commands (page 1 of 2)

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Command Object categoryActions available with modify privileges

Actions available with full control privileges

Included in predefined role

nas_ckpt_schedule Data Protection>Checkpointsand

Data Protection>VTLU

modifypauseresume

createdelete

backup operator

nas_copy Data Protection> Replication

createdestinationsourceinterconnect

no

nas_devicegroup Storage>Storage Systems

aclresumesuspend

no

nas_disk Storage>Volumes rename delete storage admin

nas_diskmark Storage>Storage Systems

mark no

nas_fs Storage>File Systems modifyrenametranslate access policy startxtend

aclcreatedeletetype

storage adminfilemover application

nas_fsck Storage>File Systems start storage adminfilemover application

nas_license System>Licenses createdeleteinit

security operator

nas_pool Storage>Pools modifyshrinkxtend

createdelete

storage admin

nas_quotas Storage> Quotas File System

edit off on

clear storage admin

Celerra Security Configuration Guide74 of 102 Release 6.0

nas_replicate Data Protection>Replication

modifyrefresh

createdeletefailoverreversestartstopswitchover

no

nas_server System>Data MoversProtocols>CIFS

aclrename

createdelete(System>Data Movers object category)

vdm (Protocols>CIFS object category)

no

nas_slice Storage>Volumes rename createdelete

storage admin

nas_storage Storage>Storage Systems

modifyrename

acldeletefallbacksync

storage admin

nas_task Data Protection>Replication

abortdelete

no

nas_volume Storage>Volumes renamextend

aclclonecreatedelete

storage admin

Table 11 nas commands (page 2 of 2)

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Command Object categoryActions available with modify privileges

Actions available with full control privileges

Included in predefined role

75 of 102Release 6.0Celerra Security Configuration Guide

Table 12 server commands (page 1 of 4)

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Command Object categoryActions available with modify privileges

Actions available with full control privileges

Included in predefined role

server_arp Networking>NIS deleteset

network admin

server_cdms Storage>Migration converthaltstart

connectdisconnect

storage admin

server_certificate Security>Public Key Certificates

cacertificate delete importpersona clear generate import

security operator

server_cifs Protocols>CIFS disableenablejoinrenamereplaceunjoinupdate

adddeletemigrate

no

server_cifssupport Protocols>CIFS aclsecmap update

secmap create delete import migration

no

server_cpu System>Data Movers haltreboot

no

server_date System>Data Movers timesvc hosts start update

timesvc delete set stop

no

server_devconfig Storage>Storage System rename create storage admin

server_dns Networking>DNS option deleteprotocol

network admin

Celerra Security Configuration Guide76 of 102 Release 6.0

server_export Protocols>NFS or

Protocols>CIFS

unexport protocol (NFS) no

server_ftp Protocols>NFS modifyservice stat reset

service start stop

network admin

server_http Storage>FileMover modifyappendremoveservice start stop

storage adminfilemover application

server_ifconfig Networking>Interfaces updownipsecnoipsecmtuvlan

createdelete

network admin

server_kerberos Protocols>CIFS keytabccachekadmin

adddelete

security operator

server_ldap Networking>NIS set clearservice start stop

network admin

server_mount Storage>File Systems allforceoptions

backup operatorstorage admin

server_mountpoint Storage>File Systems createdelete

backup operatorstorage admin

server_mpfsstat Storage>File Systems zZ

storage adminfilemover application

server_name System>Data Movers <new_name> no

Table 12 server commands (page 2 of 4)

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Command Object categoryActions available with modify privileges

Actions available with full control privileges

Included in predefined role

77 of 102Release 6.0Celerra Security Configuration Guide

server_nfs Protocols>NFS userv4 client stats zero

principalservicev4 service

nocommand options mapper set and mapping can only executed by root

server_nfsstat Protocols>NFS zero no

server_nis Networking>NIS delete network admin

server_param System>Data Movers facility no

server_rip Networking>Routing ripinnoripin

network admin

server_route Networking>Routing adddeleteflushdeleteAll

network admin

server_security Protocols>CIFS modifyupdate

adddelete

security operator

server_setup System>Data Movers loadprotocolload

no

server_snmp Networking>NIS communitylocationsyscontact

network admin

server_standby System>Data Movers activaterestore

createdelete

no

server_sysconfig Networking>Devices pci virtual delete new

network admin

server_umount Storage>File Systems temp allperm

backup operatorstorage admin

server_usermapper

Protocols>CIFS disableenableimportremove

no

Table 12 server commands (page 3 of 4)

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Command Object categoryActions available with modify privileges

Actions available with full control privileges

Included in predefined role

Celerra Security Configuration Guide78 of 102 Release 6.0

server_vtlu Data Protection>VTLU service setstorage export extend importtlu modify

drive umountstorage delete newtape eject injecttlu delete

backup operator

Table 12 server commands (page 4 of 4)

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Command Object categoryActions available with modify privileges

Actions available with full control privileges

Included in predefined role

Table 13 Commands that all roles have the privileges to execute

Command

nas_inventory

server_checkup

server_df

server_ping

server_ping6

server_sysstat

server_uptime

server_version

Table 14 Commands not covered by the role-based access feature (page 1 of 3)

Command Notes

cs_standby Requires root privileges

nas_acl Can be executed with nasadmin privileges

nas_automountmap Can be executed with nasadmin privileges

nas_ca_certificate Requires root privileges to generate a certificate

79 of 102Release 6.0Celerra Security Configuration Guide

nas_cel Can be executed with nasadmin privileges

nas_checkup Can be executed with nasadmin privileges

nas_connecthome Requires root privileges to modify and test

nas_config Requires root privileges

nas_emailuser Can be executed with nasadmin privileges

nas_event Can be executed with nasadmin privileges

nas_halt Requires root privileges

nas_logviewer Can be executed with nasadmin privileges

nas_message Can be executed with nasadmin privileges

nas_mview Requires root privileges

nas_rdf Requires root privileges

nas_version Can be executed with nasadmin privileges

server_archive Can be executed with nasadmin privileges

server_cepp Can be executed with nasadmin privileges

server_dbms Requires root privileges to delete, compact, repair, and restore the database

server_file Can be executed with nasadmin privileges

server_ipsec Can be executed with nasadmin privileges

server_iscsi Can be executed with nasadmin privileges

server_log Can be executed with nasadmin privileges

server_mpfs Can be executed with nasadmin privileges

server_mt Can be executed with nasadmin privileges

server_netstat Can be executed with nasadmin privileges

server_nfs Requires root privileges to configure secure NFS mapping

server_pax Requires root privileges to reset stats

Table 14 Commands not covered by the role-based access feature (page 2 of 3)

Command Notes

Celerra Security Configuration Guide80 of 102 Release 6.0

server_snmpd Can be executed with nasadmin privileges

server_stats Can be executed with nasadmin privileges

server_tftp Can be executed with nasadmin privileges

server_user Can be executed with nasadmin privileges

server_viruschk Can be executed with nasadmin privileges

Table 14 Commands not covered by the role-based access feature (page 3 of 3)

Command Notes

81 of 102Release 6.0Celerra Security Configuration Guide

Appendix B: Supported SSL cipher suites

Table 15 on page 81 lists the cipher suites supported by Celerra. The following lists give the SSL or TLS cipher suites names from the relevant specification and their OpenSSL equivalents. It should be noted that several cipher suite names do not include the authentication used, for example, DES-CBC3-SHA. In these cases, RSA authentication is used.

The following restrictions apply:

◆ NULL ciphers and all ADH cipher suites (because they do not allow authentication) are disabled by default.

◆ Some cipher suites will not be accepted by Celerra because of certificate size (if the certificate presented by the Data Mover has a 2048-bit key, ciphers with a smaller key will be rejected).

Table 15 Supported SSL cipher suites (page 1 of 2)

Protocol Specification name OpenSSL name

SSL v3.0 cipher suites SSL_RSA_WITH_NULL_MD5 NULL-MD5

SSL_RSA_WITH_NULL_SHA NULL-SHA

SSL_RSA_WITH_DES_CBC_SHA DES-CBC-SHA

SSL_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA

SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-EDH-RSA-DES-CBC-SHA

SSL_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA

SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA

SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5

SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA EXP-ADH-DES-CBC-SHA

SSL_DH_anon_WITH_DES_CBC_SHA ADH-DES-CBC-SHA

Celerra Security Configuration Guide82 of 102 Release 6.0

TLS v1.0 cipher suites TLS_RSA_WITH_NULL_MD5 NULL-MD5

TLS_RSA_WITH_NULL_SHA NULL-SHA

TLS_RSA_EXPORT_WITH_RC4_40_MD5 EXP-RC4-MD5

TLS_RSA_WITH_RC4_128_MD5 RC4-MD5

TLS_RSA_WITH_RC4_128_SHA RC4-SHA

TLS_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-DES-CBC-SHA

TLS_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5

TLS_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA

AES cipher suites from RFC3268, extending TLS v1.0

TLS_RSA_WITH_AES_128_CBC_SHA AES128-SHA

TLS_RSA_WITH_AES_256_CBC_SHA AES256-SHA

TLS_DHE_RSA_WITH_AES_128_CBC_SHA DHE-RSA-AES128-SHA

TLS_DHE_RSA_WITH_AES_256_CBC_SHA DHE-RSA-AES256-SHA

TLS_DH_anon_WITH_AES_128_CBC_SHA ADH-AES128-SHA

TLS_DH_anon_WITH_AES_256_CBC_SHA ADH-AES256-SHA

Additional Export 1024 and other cipher suites

Note: These ciphers can also be used in SSL v3.

TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DES-CBC-SHA

TLS_RSA_EXPORT1024_WITH_RC4_56_SHA EXP1024-RC4-SHA

SSL v2.0 cipher suites SSL_CK_DES_64_CBC_WITH_MD5 DES-CBC-MD5

SSL_CK_DES_192_EDE3_CBC_WITH_MD5 DES-CBC3-MD5

Table 15 Supported SSL cipher suites (page 2 of 2)

Protocol Specification name OpenSSL name

83 of 102Release 6.0Celerra Security Configuration Guide

Appendix C: Understanding your LDAP-based directory server configuration

This appendix provides information about tools you can use to better understand the structure of your organization’s information in the LDAP-based directory server and tips about how to interpret this information. You must understand where your users and groups are located. Use this information to set up the directory server, as outlined in "Configuring the use of an external LDAP-based directory server for user identification and authentication" on page 34, and to configure the connection between the Control Station’s LDAP-based client and the directory server, accomplished by using Unisphere Settings (UI Sessions tasks) > Manage LDAP Domain.

There are several tools available to manage LDAP-based directory services including:

◆ "Active Directory Users & Computers" on page 83

◆ "Ldap Admin" on page 90

Active Directory Users & Computers

Active Directory user and group accounts can be managed with the Active Directory Users & Computers (ADUC) MMC Snap-in. This snap-in is installed automatically on every Windows domain controller. You access this tool from Control Panel > Administrative Tools > Active Directory Users & Computers.

Table 16 on page 83 lists the information you need for a successful connection to Active Directory.

Table 16 Information required to connect to an Active Directory server

Required connection information

Your values

Fully qualified domain name(also known as the base distinguished name)

Primary domain controller/directory server IP address or hostname

Secondary domain controller/directory server IP address or hostname

Account name (also known as the bind distinguished name)

Celerra Security Configuration Guide84 of 102 Release 6.0

.

Step Action

1. Open ADUC and (if necessary) connect to the domain. Right-click the domain name, and then select Find from the menu.

85 of 102Release 6.0Celerra Security Configuration Guide

2. Identify a domain user who will be a Celerra user. To locate the user profile, type the user's name in the Find field and click Find Now.

3. Add the X.500 path to the displayed user information by selecting View > Choose Columns.

Step Action

Celerra Security Configuration Guide86 of 102 Release 6.0

4. Select X500 Distinguished Name from the Columns available field and click Add.

5. The Find window now displays the X.500 distinguished name of this user. The X.500 distinguished name contains the user’s name (CN=Joe Muggs) and the path to the container in the directory structure where this user is located: CN=Users,DC=derbycity,DC=local. Record the path.

Step Action

87 of 102Release 6.0Celerra Security Configuration Guide

6. Verify that all other Celerra users use the same path by:

• Repeating the Find for all Celerra user accounts

or

• Navigating to that area of the directory in ADUC, and locating all Celerra user accounts

7. Repeat steps 1 through 6 to find the path to the container in the directory structure where the groups are located.

If the user and group paths are both CN=Users,DC=<domain component>,DC=<domain component>[, DC=<domain component>…] (for example CN=Users,DC=derbycity,DC=local), you can use the Default Active Directory option in the Unisphere Manage LDAP Domain view. This option assumes that the users and groups are located in the default container (CN=Users), so you do not have to specify the user or group search path.

Step Action

Celerra Security Configuration Guide88 of 102 Release 6.0

8. Users might not be in the default container (CN=Users). They may instead be located in other containers or organizational units within the directory, for example Celerra Users. In this case, you need to use the Custom Active Directory option in the Unisphere Manage LDAP Domain view and manually enter the search paths.

9. Groups might not be in the default container (CN=Users), and they do not have to be located with the users. They may instead be located within other containers or organizational units within the directory.

Step Action

89 of 102Release 6.0Celerra Security Configuration Guide

10. The LDAP user and group search begins with the path specified, and searches that container and all containers below it. If Celerra users and groups are not located within the same container or organizational unit, you must use the intersection (common parts) of their collective paths when you specify the user and group search paths. In some cases, this may need to be the root of the domain. For example, assume that Celerra users are stored in the following two Active Directory locations:

Path 1: CN=Users,DC=derbycity,DC=local

Path 2: OU=Celerra Users,OU=EMC Celerra,DC=derbycity,DC=local

In order for Celerra to find all users, you need to use the intersection of the two paths as your search path, that is, the domain root DC=derbycity,DC=local.

Type this value in the User Search Path field in the Unisphere Manage LDAP Domain view.

11. Use the Find window again to determine the full X.500 path of the account you will use to connect the Celerra Control Station to the directory. In this case you should not remove the username from the path because you are specifying the path to an individual account.

If you are using the Default Active Directory option in the Unisphere Manage LDAP Domain view, type only the account name, for example Celerra LDAP Binding, in the Account Name field. You do not need to provide the X.500 syntax because the Celerra software constructs the full X.500 path.

If you are using the Custom Active Directory option in Manage LDAP Domain, then type the full X.500 path in the Distinguished Name field.

Step Action

Celerra Security Configuration Guide90 of 102 Release 6.0

Ldap Admin

Unlike Active Directory, other LDAP-based directory servers do not typically ship with a GUI management interface. In this case you might use a tool like Ldap Admin to find the proper search paths on LDAP servers. The free Ldap Admin tool (a Windows LDAP manager available from ldapadmin.sourceforge.net) lets you browse, search, modify, create, and delete objects on a LDAP server. Ldap Admin’s copy-to-clipboard functionality is especially useful for easily transferring values into the Unisphere Settings (UI Sessions tasks) > Manage LDAP Domain fields.

Table 17 on page 90 lists the information you need for a successful connection to a customized Active Directory or other LDAP-based directory server such as OpenLDAP.

Table 17 Information required to connect to a customized Active Directory or other directory LDAP-based directory server

Required connection information

Your values

Fully qualified domain name(also known as the base distinguished name)

Primary directory server IP address or hostname

Secondary directory server IP address or hostname

Distinguished name (also known as the bind distinguished name)

User search path

User name attribute

Group search path

Group name attribute

Group class

Group member

91 of 102Release 6.0Celerra Security Configuration Guide

.

Step Action

1. Start Ldap Admin and create a new connection. Click Test connection to verify the connection.

Celerra Security Configuration Guide92 of 102 Release 6.0

2. Open the connection to the LDAP server, right-click the domain name, and then select Search from the menu.

3. Identify an LDAP user who will be a Celerra user. To locate the user profile, type the user’s name in the Name field and click Start.

Step Action

93 of 102Release 6.0Celerra Security Configuration Guide

4. Right-click the appropriate user from the results list, and then select Go to from the menu. You will use this user to determine the user and group search paths. Close the Search window.

Step Action

Celerra Security Configuration Guide94 of 102 Release 6.0

5. On the main Ldap Admin window, notice that the status bar contains the distinguished name (DN) of the folder in which the user is located. Many LDAP servers follow the convention outlined in RFC2307 and put users in a People container.

6. Right-click the folder, and then select Copy dn to clipboard from the menu.

Step Action

95 of 102Release 6.0Celerra Security Configuration Guide

7. In the Unisphere Manage LDAP Domain view, select the Other Directory Servers option. Paste the DN value in the User Search Path field.

8. Verify that all other Celerra users use the same path by:

• Repeating the Search for all Celerra user accounts

or

• Navigating to that area of the directory in Ldap Admin, and locating all Celerra user accounts

Step Action

Celerra Security Configuration Guide96 of 102 Release 6.0

9. Repeat steps 2 through 8 to search on a group name to find the path to the container in the directory structure where the groups are located. When you search by group name, you have to use an advanced search and supply a search filter in the form cn=<group name>. Once the search is complete, right-click the appropriate group from the results list, and then select Go to from the menu.

10. The LDAP user and group search begins with the path specified, and searches that container and all containers below it. If Celerra users and groups are not located within the same container or organizational unit, you must use the intersection (common parts) of their collective paths when you specify the user and group search paths. In some cases, this may need to be the root of the domain. For example, assume that Celerra users are stored in the following two LDAP locations:

Path 1: OU=People,DC=openldap-eng,DC=local

Path 2: OU=Celerra Users,OU=EMC Celerra, DC=openldap-eng,DC=local

In order for Celerra to find all Celerra users, you need to use the intersection of the two paths as your search path, that is, the domain root DC=openldap-eng,DC=local.

Step Action

97 of 102Release 6.0Celerra Security Configuration Guide

11. Use the Search window to locate the user account you will use to connect the Celerra Control Station to the directory. Right-click the account name, and then select Copy dn to clipboard. Paste the DN value in the Distinguished Name field in the Unisphere Manage LDAP Domain view, for example uid=celerra,ou=People.

Step Action

Celerra Security Configuration Guide98 of 102 Release 6.0

99 of 102Release 6.0Celerra Security Configuration Guide

Index

Aaccess policies 17administrative privileges 13, 20auditing 12

CCA certificates

acquiring 54deleting 64displaying 58displaying properties 63distributing 60generating 57importing 32, 57listing 54, 63obtaining 32, 47

certificate verification 24certificates, public keychecksum support 10, 11CIFS Kerberos authentication 16Control Station

auditing 12configuring use of directory server 34Linux operating system changes 10login banner 11MOTD 11network services management 11password quality policy 14role-based user access 13security 5, 10security for infrastructure 11security to control access 13security to protect data 15session timeout 11SSL (X.509) certificates 15user identification and authentication 13using as a CA 47using LDAP-based directory server 13

cookie 10, 11

DData Mover

access policies 17CIFS Kerberos authentication 16network services management 16NFS security settings 16Packet Reflect 18PKI 19security 5, 10security to protect data 19security to secure infrastructure 16SNMP management 17SSL (X.509) certificates 19Windows-style credentials for UNIX users 17

LLDAP-based directories

structure 23LDAP-based directory server

tools 83troubleshooting 66using for user identification and authentication 13, 34

login banner 11customizing 41

Mmessage of the day 11

creating 42MOTD 11

Nnetwork services management 11, 16NFS

hide exports 16security settings 16

PPacket Reflect 18passwords

changing default 30defining policy using a script 37defining specific policy definitions 38quality policy 14, 29setting expiration 38

personasgenerating key set 30importing certificate 30providing a certificate 47requesting signed certificate 30

PKI 44public key certificates 19

CA certificates 32clearing 62creating 47displaying 61generating a key set and certificate request 48importing a CA-signed certificate 52lising 62personas 30sending the certificate request to the CA 51

Public Key Infrastructure See PKI

Rrole-based user access 13

creating 26default 28

SSecure Socket Layer See SSLsession timeout 11

changing 40configuring 39

100 of 102 Celerra Security Configuration GuideRelease 6.0

disabling 40session tokens 10, 11

changing the SHA1 secret value 43SHA1 10, 11SNMP management 17SSL 24

changing the cipher suite 45changing the protocol version 44supported cipher suites 81troubleshooting 66using certificates for Control Station and LDAP-based

directory server connection 15using certificates with Celerra Manager 15using certificates with HTTP 19, 44using certificates with LDAP 19, 44

Ttroubleshooting 65

Control Station connection to directory server 66creating binding account 66domain-mapped user accounts 68local user accounts 66setting up SSL session 66

Uuser identification and authentication 13

interface support 20planning 20

user interface choices 5users

accessing Celerra 22creating 21creating groups 25creating roles 26default 20identifying and authenticating using a directory server 22local versus domain-mapped 21troubleshooting 66, 68

WWindows-style credentials 17

101 of 102Release 6.0Celerra Security Configuration Guide

Notes

About this document

As part of its effort to continuously improve and enhance the performance and capabilities of the Celerra Network Server product line, EMC periodically releases new versions of Celerra hardware and software. Therefore, some functions described in this document may not be supported by all versions of Celerra software or hardware presently in use. For the most up-to-date information on product features, see your product release notes. If your Celerra system does not offer a function described in this document, contact your EMC Customer Support Representative for a hardware upgrade or software update.

Comments and suggestions about documentation

Your suggestions will help us improve the accuracy, organization, and overall quality of the user documentation. Send a message to [email protected] with your opinions of this document.

Copyright © 1998-2010 EMC Corporation. All rights reserved.

EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.

THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.

For the most up-to-date regulatory document for your product line, go to the Technical Documentation and Advisories section on EMC Powerlink.

For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com.

All other trademarks used herein are the property of their respective owners.

Release 6.0 102 of 102