NetBackup 52xx and 5330 Appliance Security Guide - 2.7.2
NetBackup 52xx and 5330 Appliance Security Guide - 2.7.2
NetBackup 52xx and 5330 Appliance Security Guide - 2.7.2
Release 2.7.2
Legal Notice
Copyright © 2016 Veritas Technologies LLC. All rights reserved.
Veritas , the Veritas Logo, NetBackup, and Storage Foundation are trademarks or registered
trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other
names may be trademarks of their respective owners.
This product may contain third party software for which Veritas is required to provide attribution
to the third party (“Third Party Programs”). Some of the Third Party Programs are available
under open source or free software licenses. The License Agreement accompanying the
Software does not alter any rights or obligations you may have under those open source or
free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation
or TPIP ReadMe File accompanying this product for more information on the Third Party
Programs.
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Veritas Technologies
LLC and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Veritas as on premises or
hosted services. Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be solely in
accordance with the terms of this Agreement.
Veritas Technologies LLC
500 E Middlefield Road
Mountain View, CA 94043
http://www.veritas.com
Technical Support
Technical Support maintains support centers globally. Technical Support’s primary
role is to respond to specific queries about product features and functionality. The
Technical Support group also creates content for our online Knowledge Base. The
Technical Support group works collaboratively with the other functional areas within
the company to answer your questions in a timely fashion.
Our support offerings include the following:
■ A range of support options that give you the flexibility to select the right amount
of service for any size organization
■ Telephone and/or Web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers software upgrades
■ Global support purchased on a regional business hours or 24 hours a day, 7
days a week basis
■ Premium service offerings that include Account Management Services
For information about our support offerings, you can visit our website at the following
URL:
www.veritas.com/support
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Customer service
Customer service information is available at the following URL:
www.veritas.com/support
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and support contracts
■ Advice about technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs, DVDs, or manuals
Support agreement resources
If you want to contact us regarding an existing support agreement, please contact
the support agreement administration team for your region as follows:
Japan CustomerCare_Japan@veritas.com
Contents
About user This section describes the types of users, See “About user
authentication on user accounts, and processes allowed to authentication on the
the NetBackup access the appliance. NetBackup appliance”
appliance on page 18.
About configuring This section describes the configuration See “About configuring
user authentication options for the various types of users that user authentication”
can authenticate on the appliance. on page 23.
About the appliance This section describes the login banner See “About the appliance
login banner feature where you can set a text banner to login banner”
appear when a user tries to authenticate on page 29.
on the appliance.
About user name This section describes the user name and See “About user name
and password password credentials. and password
specifications specifications”
on page 30.
About user This section describes the key See “About user
authorization on the characteristics of the authorization process authorization on the
NetBackup of the NetBackup Appliance. NetBackup appliance”
appliance on page 35.
About authorizing This section describes the administrative See “About authorizing
NetBackup options for authorizing appliance users with NetBackup appliance
appliance users various access permissions. users” on page 36.
About the This section describes the Administrator See “About the
Administrator user user role. Administrator user role”
role on page 39.
About the This section describes the NetBackupCLI See “About the
NetBackupCLI user user role. NetBackupCLI user role”
role on page 40.
About Symantec This section introduces the SDCS feature See “About Symantec
Data Center implemented with the appliances. Data Center Security on
Security on the the NetBackup
NetBackup appliance” on page 43.
appliance
About the This section describes the IPS policy that See “About the
NetBackup is used to protect the appliances. NetBackup appliance
appliance intrusion intrusion prevention
prevention system system” on page 45.
About the This section describes the IDS policy that See “About the
NetBackup is used to monitor the appliances. NetBackup appliance
appliance intrusion intrusion detection
detection system system” on page 46.
About the NetBackup Appliance Security Guide 13
About the NetBackup Appliance Security Guide
Reviewing SDCS This section describes the SDCS events See “Reviewing SDCS
events on the based on their level of security. events on the NetBackup
NetBackup appliance” on page 47.
appliance
Running SDCS in This section briefly describes the default See “Running SDCS in
unmanaged mode security management on the appliance. unmanaged mode on the
on the NetBackup NetBackup appliance”
appliance on page 50.
Running SDCS in This section describes how you can See “Running SDCS in
managed mode on manage appliance security as part of a managed mode on the
the NetBackup centralized SDCS environment. NetBackup appliance”
appliance on page 50.
Overriding the This section describes the procedure to See “Overriding the
NetBackup override the IPS policy that is applied to the NetBackup appliance
appliance intrusion appliances. intrusion prevention
prevention system system policy”
policy on page 51.
Re-enabling the This section describes the procedure to See “Re-enabling the
NetBackup re-enable the IPS policy that is applied to NetBackup appliance
appliance intrusion the appliances. intrusion prevention
prevention system system policy”
policy on page 54.
About working with This chapter provides an overview on all See “About NetBackup
log files the different types of logs that you can view appliance log files”
for the NetBackup Appliance. on page 57.
About using the This chapter describes the usage of the See “About the Collect
Collect Log files Collect Log files wizard present on the Log files wizard”
wizard NetBackup Appliance Web Console. on page 59.
About the NetBackup Appliance Security Guide 14
About the NetBackup Appliance Security Guide
Viewing log files This chapter describes the procedure to See “Viewing log files
using the Support view log files using the support command. using the Support
command command” on page 60.
Locating NetBackup This chapter describes the usage of Browse See “Where to find
Appliance log files command to view log files. NetBackup appliance
using the Browse log files using the
command Browse command”
on page 61.
Gathering device This chapter describes the procedure to See “Gathering device
logs with the gather device logs. logs with the DataCollect
DataCollect command” on page 62.
command
About NetBackup This section describes the different update See “About NetBackup
appliance operating types that are made to the operating system appliance operating
system security to improve the security of the overall system security”
NetBackup Appliance. on page 66.
Major components This section lists the products and operating See “Major components
of the NetBackup system components of the NetBackup of the NetBackup
appliance OS Appliance. appliance OS”
on page 67.
Disabled service This section lists the OS service accounts See “Disabled service
accounts on the that are disabled on the appliance. accounts on the
NetBackup NetBackup appliance”
appliance on page 68.
About Data This section lists the measures that are taken See “About Data
Security to improve data security. Security” on page 70.
About Data Integrity This section lists the measures that are taken See “About Data
to improve data integrity. Integrity” on page 71.
About Data This section lists the measures that are taken See “About Data
Classification to improve data classification. Classification”
on page 72.
About Data This section lists the measures that are taken See “About Data
Encryption to improve data encryption. Encryption ” on page 72.
About SSL This section lists the SSL certification updates See “About SSL
certification for NetBackup Appliance Web Console. certification”
on page 75.
About IPsec This section describes the IPsec configuration See “About IPsec
Channel for NetBackup Appliances. Channel Configuration”
Configuration on page 78.
About the NetBackup Appliance Security Guide 16
About the NetBackup Appliance Security Guide
About NetBackup This section describes the port information See “About the
Appliance 52xx for NetBackup Appliances. NetBackup Appliance
ports 52xx ports” on page 80.
About AutoSupport This section describes the AutoSupport feature See “About
in the NetBackup Appliance. AutoSupport ”
on page 83.
About Call Home This section describes the Call Home feature See “About Call Home”
in the NetBackup Appliance. on page 84.
About SNMP This section describes the SNMP feature in See “About SNMP”
the NetBackup Appliance. on page 89.
Listing the This section lists the recommended IPMI See “Recommended
Recommended settings for a secure configuration. IPMI settings”
IPMI settings on page 91.
About the NetBackup Appliance Security Guide 17
About the NetBackup Appliance Security Guide
Appendices
Table 1-11 Appendix listed in the Security Guide
Appendix A: Software This appendix lists the OS packages See “List of software
packages included in the that are includes as a part of packages included in the
NetBackup appliance OS NetBackup appliance OS. NetBackup appliance
OS” on page 98.
Intended Audience
This guide is intended for the users that include security administrators, backup
administrators, system administrators, and IT technicians who are tasked with
maintaining the NetBackup Appliance.
Chapter 2
User authentication
This chapter includes the following topics:
User The NetBackup appliance is administered and managed through user accounts. You can
create local user accounts, or register users and user groups that belong to a remote directory
service. Each user account must authenticate itself with a user name and password to
access the appliance. For a local user, the user name and password are managed on the
appliance. For a registered remote user, the user name and password are managed by the
remote directory service.
In order for a new user account to log on and access the appliance, you must first authorize
it with a role. By default, a new user account does not have an assigned role, and therefore
it cannot log on until you grant it a role.
You can grant the following roles to a user or user group:
■ Administrator
A user account that is assigned the Administrator role is provided administrative privileges
to manage the NetBackup appliance. An Administrator user is allowed to log on, view,
and perform all functions on the NetBackup Appliance Web Console and the NetBackup
Appliance Shell Menu. These user accounts have permissions to log on to the appliance
and run NetBackup commands with superuser privileges.
See “About the Administrator user role” on page 39.
■ NetBackupCLI
A user account that is assigned the NetBackupCLI role can execute all NetBackup
commands, view logs, edit NetBackup touch files, and edit NetBackup notify scripts.
NetBackupCLI users are solely restricted to run NetBackup commands with superuser
privileges and do not have access outside the scope of NetBackup software directories.
Once these users log on, they are taken to a restricted shell from where they can run
the NetBackup commands.
See “About the NetBackupCLI user role” on page 40.
admin The admin account is the default Administrator user on the NetBackup appliance.
New NetBackup appliances are shipped with the following default logon credentials:
Maintenance The Maintenance account is used by Veritas Support through the NetBackup Appliance
Shell Menu (after an administrative log-on). This account is used specifically to perform
maintenance activity or to troubleshoot the appliance.
sisips The sisips account is an internal user for implementing the SDCS policies.
User authentication 20
About user authentication on the NetBackup appliance
root The root account is a restricted user that is only accessed by Veritas Support to perform
maintenance tasks. If you try to access this account, the following message is displayed:
Warning: Please note that you can override the Veritas Intrusion Security Policy (ISP) to
gain access to the root account. However, doing so is not recommended as it puts the
system at risk and vulnerable to attack.See “Overriding the NetBackup appliance intrusion
prevention system policy” on page 51.
Local (native A local user is added to the appliance ■ You can use the Settings > Authentication >
user) database and is not referenced to an external User Management page from the NetBackup
directory-based server like an LDAP server. Appliance Web Console to add, delete, and
Once the user has been added, you can then manage local users.
grant or revoke the appropriate appliance ■ You can use the Settings > Security >
access permissions. Authentication > LocalUser command
from the NetBackup Appliance Shell Menu to add
and delete local users, as well as change their
passwords.
■ You cannot add local user groups.
■ A local user can have the Administrator or
NetBackupCLI role.
Note: You cannot grant the NetBackupCLI role
to an existing local user. However, you can create
a local NetBackupCLI user by using the Manage
> NetBackupCLI > Create command from
the NetBackup Appliance Shell Menu.
LDAP An LDAP (Lightweight Directory Access ■ You can use the Settings > Authentication >
Protocol) user or user group exists on an User Management page from the NetBackup
external LDAP server. After configuring the Appliance Web Console to add, delete, and
appliance to communicate with the LDAP manage LDAP users and user groups.
server, you can register those users and user ■ You can use the Settings > Security >
groups with the appliance. Once the user has Authentication > LDAP command from the
been registered (added), you can then grant NetBackup Appliance Shell Menu to add and
or revoke the appropriate appliance access delete LDAP users and user groups.
permissions. ■ You can assign the Administrator or
See “About authenticating LDAP users” NetBackupCLI role to an LDAP user or user
on page 26. group.
Note: The NetBackupCLI role can be assigned
to a maximum of nine (9) user groups at any
given time.
User authentication 22
About user authentication on the NetBackup appliance
Active An Active Directory (AD) user or user group ■ You can use the Settings > Authentication >
Directory exists on an external AD server. After User Management page from the NetBackup
configuring the appliance to communicate with Appliance Web Console to add, delete, and
the AD server, you can register those users manage AD users and user groups.
and user groups with the appliance. Once the ■ You can use the Settings > Security >
user has been registered (added), you can Authentication > ActiveDirectory
then grant or revoke the appropriate appliance command from the NetBackup Appliance Shell
access permissions. Menu to add and delete AD users and user
See “About authenticating Active Directory groups.
users” on page 27. ■ You can assign the Administrator or
NetBackupCLI role to an AD user or user group.
Note: The NetBackupCLI role can be assigned
to a maximum of nine (9) user groups at any
given time.
Kerberos-NIS A NIS (Network Information Service) user or ■ You can use the Settings > Authentication >
user group exists on an external NIS server. User Management page from the NetBackup
Unlike the LDAP and AD implementations, Appliance Web Console to add, delete, and
configuring the appliance to communicate with manage NIS users and user groups.
the NIS domain requires Kerberos ■ You can use the Settings > Security >
authentication. You must have an existing Authentication > Kerberos command from
Kerberos service associated with your NIS the NetBackup Appliance Shell Menu to add and
server before you can configure the appliance delete NIS users and user groups.
to register the NIS users. ■ You can assign the Administrator or
After configuring the appliance to communicate NetBackupCLI role to a NIS user or user group.
with the NIS server and the Kerberos server, Note: The NetBackupCLI role can be assigned
you can register the NIS users and user to a maximum of nine (9) user groups at any
groups with the appliance. Once the user has given time.
been registered (added) to the appliance, you
can then grant or revoke the appropriate
appliance access permissions.
For detailed instructions on configuring new users, refer to the NetBackup Appliance
Administrator's Guide.
User authentication 23
About configuring user authentication
User type NetBackup Appliance Web Console NetBackup Appliance Shell Menu
Local (native user) Use the Settings > Authentication > User The following commands and options are
Management tab in the NetBackup Appliance available under Settings > Security >
Web Console to add local users. Authentication > LocalUser:
See “About authorizing NetBackup appliance ■ Clean - Delete all of the local users.
users” on page 36. ■ List - List all of the local users that have
been added to the appliance.
■ Password - Change the password of a local
user.
■ Users - Add or remove one or more local
users.
User authentication 24
About configuring user authentication
User type NetBackup Appliance Web Console NetBackup Appliance Shell Menu
LDAP You can perform the following LDAP The following commands and options are
configuration tasks under Settings > available under Settings > Security >
Authentication > LDAP: Authentication > LDAP:
User type NetBackup Appliance Web Console NetBackup Appliance Shell Menu
Active Directory You can perform the following AD The following commands and options are
configuration tasks under Settings > available under Settings > Security >
Authentication > Active Directory: Authentication > ActiveDirectory:
Kerberos-NIS You can perform the following Kerberos-NIS The following commands and options are
configuration tasks under Settings > available under Settings > Security >
Authentication > Kerberos-NIS : Authentication > Kerberos:
■ You cannot add a new user or a user group to an appliance if it has the same
user name, user ID, or group ID as an existing user on that appliance.
See “About user authentication on the NetBackup appliance” on page 18.
See “About authorizing NetBackup appliance users” on page 36.
■ Ensure that the LDAP server is available and is set up with the users and user
groups that you want to register with the appliance.
Interface Notes
Table 2-4 Appliance interfaces that support the login banner (continued)
Interface Notes
NetBackup Administration Console (optional) The login banner appears whenever a user
attempts to log on to the appliance using the
NetBackup Administration Console. This
feature uses the pre-existing login banner
functionality that is a part of NetBackup. For
more information, refer to the NetBackup
Administrator's Guide, Volume I.
Note: The Manage > NetBackupCLI > Create command is used to create local
users with the NetBackupCLI role. All the local user and password specifications
apply to these users.
Restrictions User names must not User names must not start Determined by the
start with: with: LDAP, AD, or NIS
policy
■ Number ■ Number
■ Special character ■ Special character
User authentication 31
About user name and password specifications
Space inclusion User names must not User names must not Determined by the
include spaces. include spaces. LDAP, AD, or NIS
policy
Password specifications
The NetBackup appliance password policy has been updated to increase security
on the appliance. The password for the appliance user account must be in the
format that the selected authentication system accepts. Table 2-6 lists the password
specifications for each user type.
Space inclusion Passwords must not Passwords must not Determined by the
include spaces. include spaces. LDAP, AD, or NIS
policy
Password expiry Not applicable as the Use the Manage > Determined by the
password does not NetBackupCLI > LDAP, AD, or NIS
expire PasswordExpiry policy
command to manage
NetBackupCLI user
passwords.
Warning: The NetBackup appliance does not support setting the Maintenance
account password using commands like yppasswd root or passwd root. A
password that is set in this fashion is overwritten once the system is upgraded. You
should use the NetBackup Appliance Shell Menu to change the Maintenance account
password.
Password encryption
The NetBackup appliance uses the following password encryption measures:
■ Starting with NetBackup appliance software version 2.6.1.1, the SHA-512
encryption algorithm is used for hashing the passwords of all customer-accessible
local appliance users (local users, NetBackupCLI users, the Administrator user,
and the Maintenance user). Whenever you create a new local appliance user,
or change an existing local appliance user's password, the password is encrypted
using SHA-512.
Note: Before 2.6.1.1, the appliance used a variety of default password encryption
algorithms that included SHA-512, SHA-256, and Blowfish. When you upgrade
your appliance to 2.6.1.1 or newer, the existing password hashes are preserved
even though the new default is SHA-512. Although the previous algorithms
remain functional and secure, Veritas recommends that you eventually change
the passwords of all the local appliance users after you upgrade to NetBackup
appliance software version 2.6.1.1 or newer so that they use the new default.
User authentication 34
About user name and password specifications
■ The password history is set to 7, meaning that the old passwords are encrypted
and logged up to seven times. If you try to use the old password as the new
password, the appliance displays a token manipulation error.
■ Passwords in transit include the following:
■ An SSH log-in where the password is protected by the SSH protocol.
■ A NetBackup Appliance Web Console log-in where the password is protected
by HTTPS communication.
Role Description
Role Description
Note: The NetBackup appliance does not currently limit login attempts and enforce
lockout policies. These features will be implemented in future releases.
Manage users The following options are available Use the Settings > Security
under Settings > Authentication > Authentication commands
> User Management to add, delete, and view appliance
users.
■ View all of the users that have
been added to the appliance. See “About configuring user
■ Expand and view all belonging authentication” on page 23.
users to a single user group.
■ Add and delete local users.
■ Add and delete
LDAP/AD/Kerberos-NIS users
and user groups.
Manage user The following options are available The following commands and
permissions (roles) under Settings > Authentication options are available under Main
> User Management: > Settings > Security >
Authorization:
■ Grant and revoke the
Administrator role for users and ■ Grant
user groups. Grant the Administrator and
■ Grant and revoke the NetBackupCLI roles to specific
NetBackupCLI role for users users and users groups that
and user groups. have been added to the
■ Synchronize members of appliance.
registered user groups with ■ List
Administrator role. List all of the users and user
groups that have been added
to the appliance, along with
their designated roles.
■ Revoke
Revoke the Administrator and
NetBackupCLI roles from
specific users and users
groups that have been added
to the appliance.
■ SyncGroupMembers
Synchronize members of
registered user groups.
User authorization 38
About authorizing NetBackup appliance users
■ The NetBackupCLI role can be assigned to a maximum of nine (9) user groups
at any given time.
■ Active Directory (AD) user groups and user names support the use of a hyphen
character in those names. The hyphen must appear between the first and the
last character of a user name or a user group name. AD user names and user
group names cannot begin or end with a hyphen.
■ You can list all users of a group that has maximum to 2000 users from
theNetBackup Appliance Web Console. To list all of a group that has more than
2000 users, use the List command from theNetBackup Appliance Shell Menu.
■ The user with the NetBackupCLI role is also in a group that is assigned the
Administrator role.
■ The user with the Administrator role is also in a group that is assigned the
NetBackupCLI role.
Note: When granting a user to have privileges to the NetBackupCLI and the
NetBackup Appliance Shell Menu, an extra step is required. The user must enter
the switch2admin command from the NetBackup CLI to access the NetBackup
Appliance Shell Menu.
Rights Restrictions
The NetBackupCLI user can use the The following restrictions are placed on
NetBackup Appliance Shell Menu to do the NetBackupCLI users:
following:
■ NetBackupCLI users do not have access
■ Run the NetBackup CLI and access the outside of the NetBackup software
NetBackup directories and files. directories.
■ Modify or create NetBackup notify scripts ■ They cannot edit the bp.conf file directly
using the cp-nbu-notify command. using an editor. Use the bpsetconfig
Note: The notify script restriction has command to set an attribute.
been lifted from versions 2.6.0.2 and ■ The cp-nbu-config command supports
higher. creating and editing NetBackup touch
configuration files only in the
■ Run the following NetBackup commands
/usr/openv/netbackup/db/config
and for the following directories that
directory.
contain the NetBackup CLI:
■ They cannot use the man or -h command
■ /usr/openv/netbackup/bin/*
to see the help of any other command.
■ /usr/openv/netbackup/bin/admincmd/*
■ /usr/openv/netbackup/bin/goodies/*
■ /usr/openv/volmgr/bin/*
■ /usr/openv/volmgr/bin/goodies/*
■ /usr/openv/pdde/pdag/bin/mtstrmd
■ /usr/openv/pdde/pdag/bin/pdcfg
■ /usr/openv/pdde/pdag/bin/pdusercfg
■ /usr/openv/pdde/pdconfigure/pdde
■ /usr/openv/pdde/pdcr/bin/*
1
1
1
2
Intrusion prevention and intrusion detection systems 45
About the NetBackup appliance intrusion prevention system
To set up managed mode, you can install the SDCS server and management
console and then connect the appliance to an SDCS server.
Use Monitor > SDCS Events page to:
■ Download SDCS server and console
■ Install the server and console
■ Download NetBackup Appliance IPS and IDS policies
■ Apply these polices using the SDCS management console
■ Connect the NetBackup appliances with the server
■ Monitor events for all the NetBackup appliances connected to this server.
Use Monitor > SDCS Events > Connect to SDCS server to:
■ Add SDCS server details
■ Download authentication certificate
■ Connect to the SDCS server
For complete information about the SDCS implementation on the appliance, refer
to the NetBackup Appliance Security Guide.
■ cron
■ syslog-ng
■ klogd
■ rpc.idmapd
Intrusion prevention and intrusion detection systems 46
About the NetBackup appliance intrusion detection system
■ rpc.mountd
■ rpc.statd
■ rpcbind
■ Self-Protection for the SDCS agent itself to ensure that the security features
and monitoring features of SDCS are not compromised.
■ Lock-down of access to system binaries, except by identified and trusted
applications, users, and user groups.
■ Confinements that protect the system from the applications that try to install
software, such as sbin) or change system configuration settings, such as hosts
file.
■ Prohibits applications from executing critical system calls such as mknod, modctl,
link, mount, and so on.
For more information about retrieving SDCS audit logs, refer to the NetBackup
Appliance Administrator's Guide.
For information about the appliance operating system logs, such as syslogs and
other appliance logs, See “About NetBackup appliance log files” on page 57.
Intrusion prevention and intrusion detection systems 50
Running SDCS in unmanaged mode on the NetBackup appliance
4 Use the SDCS console to apply the IPS and IDS policies to the connected
appliance.
Warning: Disabling the IPS policy is not recommended as it puts the system at risk
and vulnerable to attack.
You can use the NetBackupCLI user role to run NetBackup commands without
overriding the IPS policy. See “About the NetBackupCLI user role” on page 40.
Note: Overriding the IPS policy disables only the appliance intrusion prevention
system. The appliance intrusion detection system (IDS) logging is still enabled and
every activity under the maintenance account is still logged.
Intrusion prevention and intrusion detection systems 52
Overriding the NetBackup appliance intrusion prevention system policy
app123.Support> Maintenance
<!-- Maintenance Mode --!>
maintenance's password:
3 In Maintenance Mode, type the following command to override the IPS policy:
/opt/Symantec/sdcssagent/IPS/sisipsoverride.sh
Password:
4 Enter the Maintenance user account password. The following options are
displayed:
Choice?
Intrusion prevention and intrusion detection systems 53
Overriding the NetBackup appliance intrusion prevention system policy
Note: Veritas recommends that you use Option 1. Selecting Option 1 allows
modification only to the NetBackup Appliance Shell Menu and not to the SDCS
agent.
1. 15 minutes
2. 30 minutes
3. 1 hour
4. 2 hours
5. 4 hours
6. 8 hours
6 Enter the appropriate number from 1 to 7 based on the amount of time that is
required to debug the support case.
The appliance displays the following message:
The appliance overrides the policy and displays the following message:
You should now have access to the root account for debugging the appliance.
app123.Support> Maintenance
<!-- Maintenance Mode --!>
maintenance's password:
Intrusion prevention and intrusion detection systems 55
Re-enabling the NetBackup appliance intrusion prevention system policy
3 In Maintenance Mode, type the following command to re-enable the IPS policy:
/opt/Symantec/sdcssagent/IPS/sisipsoverride.sh
The appliance re-enables the policy and the following message is displayed:
......
■ Where to find NetBackup appliance log files using the Browse command
NetBackup Appliance Web You can use the Collect Log files wizard ■ Logs created by the NetBackup
Console from the NetBackup Appliance Web Copy Logs tool (nbcplogs)
Console to collect log files from an ■ Appliance logs including high
appliance. availability, hardware, and event
See “About the Collect Log files wizard” logs
on page 59. ■ Operating system logs
■ All logs related to Media Server
Deduplication Pool (MSDP)
■ All logs related to the NetBackup
Appliance Web Console
■ Diagnostic information about
NetBackup and the operating
system
■ Hardware and storage device logs
NetBackup Appliance Web You can use the Monitor > SDCS Audit Appliance audit logs
Console View screen from the NetBackup Appliance
Web Console to retrieve the audit logs of
an appliance. See “Reviewing SDCS events
on the NetBackup appliance” on page 47.
NetBackup Appliance Shell Menu You can use the Main > Support > ■ Appliance configuration log
Logs > Browse commands to open the ■ NetBackup logs, Volume Manager
LOGROOT/> prompt. You can use logs, and the NetBackup logs that
commands like ls and cd to work with the are contained in the openv
appliance log directories and obtain the directory
various logs. ■ Appliance operating system (OS)
See “Viewing log files using the Support installation log
command” on page 60. ■ NetBackup administrative web
user interface log and the
NetBackup web server log
■ NetBackup 52xx appliance device
logs
Log files 59
About the Collect Log files wizard
NetBackup Appliance Shell Menu You can use the Main > Support > Appliance unified logs:
Logs > VxLogView Module
■ All
ModuleName commands to access the
■ CallHome
appliance VxUL (unified) logs. You can also
■ Checkpoint
use the Main > Support > Share
Open commands and use the desktop to ■ Commands
map, share, and copy the VxUL logs. ■ Common
■ Config
■ CrossHost
■ Database
■ Hardware
■ HWMonitor
■ Network
■ RAID
■ Seeding
■ SelfTest
■ Storage
■ SWUpdate
■ Trace
■ FTMS
■ TaskService
■ AuthService
NetBackup Appliance Shell Menu You can use the Main > Support > Appliance storage device logs
DataCollect commands to collect
storage device logs.
NetBackup-Java applications If you encounter problems with the Logs relating to the NetBackup-Java
NetBackup-Java applications, you can use applications
the scripts in this section to gather the
required information for contacting support.
2 If you want, you can copy the unified logs with the Main > Support > Share
Open command. Use the desktop to map, share, and copy the logs.
Note: The NetBackup Appliance unified logs are not the same as the NetBackup
unified logs, such as nbpem or nbjm. NetBackup Appliance has its own set of unified
logs. To collect the NetBackup unified logs, use the Collect Logs Wizard and select
NetBackup.
You can also use the Main_Menu > Support > Logs commands to do the following:
■ Upload the log files to Veritas Technical Support.
■ Set log levels.
■ Export or remove CIFS and NFS shares.
Note: The NetBackup Appliance VxUL logs are no longer archived by a cron job,
or a scheduled task. In addition, log recycling has been enabled, and the default
number of log files has been set to 50.
Refer to the NetBackup Appliance Command Reference Guide for more information
on the above commands.
See “About NetBackup appliance log files” on page 57.
config_nb_factory.log
selftest_report
Log files 62
Gathering device logs with the DataCollect command
hostchange.log
boot.log
boot.msg
boot.omsg
messages
Along with the operating system, IPMI, and storage logs, the DataCollect command
now collects the following logs as well:
■ Patch logs
■ File System logs
■ Test hardware logs
■ CPU information
■ Disk performance logs
■ Memory information
■ Hardware information
To gather device logs with the DataCollect command
1 Log on to the administrative NetBackup Appliance Shell Menu.
2 Open the Support menu. To open the support menu, use the following
command:
=======================End of DataCollect==================
All logs have been collected in /tmp/DataCollect.zip
4 Copy the DataCollect.zip to your local folders using the Main > Support
> Logs > Share Open command.
5 You can send the DataCollect.zip file to the Veritas Support team to resolve
your issues.
See “About NetBackup appliance log files” on page 57.
Chapter 6
Operating system security
This chapter includes the following topics:
■ The appliance OS includes edited kernel parameters that secure the appliance
against attacks such as denial of service (DoS). For example, the sysctl setting
net.ipv4.tcp_syncookies has been added to /etc/sysctl.conf configuration
file to implement TCP SYN cookies.
■ Unnecessary runlevel services are disabled. The appliance OS uses runlevels
to determine the services that should be running and to allow specific work to
be done on the system.
■ FTP, telnet, and rlogin (rsh) are disabled. Usage is limited to ssh, scp, and
sftp.
RabbitMQ 3.5.0-1
Nessus™ 6.5.0
QualysGuard™ 7.17.21-1
KMS support
The NetBackup Appliance supports encryption managed by NetBackup Key
Management Service (KMS) which is integrated with NetBackup Enterprise Server
7.1. With version 2.6 and later, KMS is supported on a NetBackup Appliance
configured as a Master or a Media Server. Regenerating the data encryption key
is the only supported method of recovering KMS on an Appliance Master Server.
It has the following key features:
■ It does not require an additional license.
■ It is a master server-based symmetric key management service.
■ It can be administered as a Master Server with tape devices connected to it or
to another NetBackup Appliance.
■ It manages symmetric cryptography keys for tape drives, that conform to the
T10 standard (such as LTO4 or LTO5).
■ It is designed to use volume pool-based tape encryption.
■ It can be used with tape hardware, that has built-in hardware encryption
capability.
■ It can be managed by a NetBackup CLI administrator using the NetBackup
Appliance Shell Menu or the KMS Command Line Interface (CLI).
Note: In the versions earlier than 2.6 of the NetBackup Appliance, KMS is only
supported when the appliance is configured as a Media Server. A non-Appliance
Master Server is required to administrate KMS with devices connected to a
NetBackup Appliance.
Key file This is the most important file for KMS. It contains /usr/openv/kms/db/KMS_DATA.dat
or key the data encryption keys.
database
Third-party certificates
You can manually add and implement third-party certificates for the Web service
support. The appliance uses the Java keystore as the repository of security
certificates. A Java keystore (JKS) is a repository of security certificates, like
authorization certificates or public key certificates that are used for instance in SSL
encryption.
Web security 76
Implementing third-party SSL certificates
Note: The procedure to implement third-party certificates varies with the type of
PKCS (Public-key Cryptography Standards) used. For more information on
implementing third-party certificates using PKCS# 7 and PKCS# 12 standard formats,
refer to the NetBackup Appliance Administrator's Guide.
PKCS#12 format 1 Convert PEM formatted x509 Cert and Key to a PKCS# 12,
using the following commands:
3 Replace the existing keystore file with your new keystore file. The default file
name is /opt/SYMCnbappws/Security/keystore.
4 Correct the following information in the configuration files:
■ Change the keystoreFile and keystorePass settings in the
/opt/SYMCnbappws/config/server.xml.
Command Description
Network > Security > You can use this command to configure IPsec between
Configure any two hosts. You can define the hosts by the host name.
You can also identify them by the user ID and password.
Network > Security > You can use this command to remove IPsec policies for
Delete a list of remote hosts on a local system. You can use this
command to remove IPsec policies for a list of remote
hosts on a local system. Remove IPsec policies for a list
of remote hosts on a local system. Use the Hosts variable
to define one or more host names. Use a comma to
separate multiple host names.
Network > Security > Use this command to export the IPsec credentials. The
Export EnterPasswd field is used to answer the question, "Do
you want to enter a password?". You must enter
a value of yes or no in this field. In addition, you must
specify a path that defines where you want to place the
exported credentials.
Note: The IPsec credentials are removed during a
reimage process. The credentials are unique for each
appliance and are included as part of the original factory
image. The IPsec credentials are not included on the USB
drive that is used to reimage the appliance.
Network > Security > Use this command to import the IPsec credentials.
Import
The EnterPasswd field is used to answer the question,
"Do you want to enter a password?". You must
enter a value of yes or no in this field. In addition, you
must specify a path that defines where you want to place
the imported credentials.
Network > Security > Use this command to provision IPsec policies for a list of
Provision remote hosts on a local system. Use the Hosts variable
to define one or more host names. Use a comma to
separate multiple host names.
Network security 80
About the NetBackup Appliance 52xx ports
Command Description
Network > Security Use this command to reload the IPsec configuration. The
(IPsec) > Refresh [Auto] option defines whether the configurations on all
referenced hosts are refreshed or not. You can enter
[Auto] or [NoAuto]. The default value is [NoAuto].
Network > Security > Show Display the IPsec policies for a local host or a provided
host. The [[Verbose]] option is used to define whether
the output is verbose or not. The values that you can enter
in this field are [VERBOSE] or [NoVERBOSE]. The default
value is [NoVERBOSE]. The [[HostInfo] ]option can
contain the following information that is separated by a
comma. The host name, the user ID (optional), and the
password (optional).
Network > Security > Use this command to unconfigure IPsec between any two
Unconfigure hosts. The Host1Info variable can contain the
following information that is separated by a comma. The
host name, the user ID (optional), and the password
(optional). The [Host2info] variable can contain the
host name, the user ID (optional), and the password
(optional).
You can use the Main > Network > Security command from the NetBackup
Appliance Shell Menu to configure the IPSec channel between two hosts. For more
information of configuring IPsec channels, refer to the NetBackup Appliance
Command Reference Guide.
Warning: The NetBackup Appliance Web Console is now available only over
HTTPS on the default port 443; port 80 over HTTP has been disabled. Please use
https://<appliance-name> to log in to the Web Console, where appliance-name
is the fully qualified domain name (FQDN) of the Appliance and can also be an IP
address.
Table 9-2 lists the ports open for inbound communication to the NetBackup
Appliance.
++ Once the NFS service is shut down, the vulnerability scanners do not pick up
these ports as threats.
Note: Ports 7578, 5120, and 5123 are for the unencrypted mode. Ports 7528, 5124,
and 5127 are for the encrypted mode.
Table 9-3 list the ports outbound from the appliance to allow alerts and notifications
to the indicated servers.
** This port number can be changed within the appliance configuration to match
the remote server.
A complete list of all the applicable ports is available in the NetBackup Network
Ports Reference Guide.
Chapter 10
Call Home security
This chapter includes the following topics:
■ About AutoSupport
■ About SNMP
About AutoSupport
The AutoSupport feature lets you register the appliance and your contact details
at the Veritas support website . Veritas support uses this information to resolve any
issue that you report. The information allows Veritas support to minimize downtime
and provide a more proactive approach to support.
Provide the registration details for your appliance using one of the following
provisions:
■ The MyAppliance portal before you install the appliance
■ The appliance initial configuration on the Registration page
■ The NetBackup Appliance Web Console by navigating to Settings > Notification
> Registration page
■ The NetBackup Appliance Shell Menu by running the Settings > Alerts >
CallHome Registration command. For more information about this command,
refer to the NetBackup Appliance Command Reference Guide.
You can register by entering the following basic information:
■ Name: Your name, company name
■ Address, where the appliance is physically located: City, street, state, ZIP Code
■ Contact information: Phone number, email address
Call Home security 84
About Call Home
The support infrastructure is designed to allow Veritas support to help you in the
following ways:
■ Proactive monitoring lets Veritas support to automatically create cases, fix issues,
and dispatch any appliance parts that might be at risk.
■ The AutoSupport infrastructure within Veritas analyzes the Call Home data from
appliance. This analysis provides proactive customer support for hardware
failures, reducing the need for backup administrators to initiate support cases.
■ With AutoSupport ability, Veritas support can begin to understand how customers
configure and use their appliances, and where improvements would be most
beneficial.
■ Send and receive status and alert notifications for the appliance.
■ Receive hardware and software status using Call Home.
■ Provide more insight into the issues and identify any issues that might further
occur as a result of the existing issue.
■ View reports from the Call Home data to analyze patterns of hardware failure,
and see usage trends. The appliance sends health data every 30 minutes.
The information that you provide for appliance registration helps Veritas support to
initiate resolution of any issue that you report. However, if you want to provide
additional details such as a secondary contact, phone, rack location, and so on,
you can visit https://my.veritas.com.
commands. For more information about the Monitor > Hardware commands, refer
to the NetBackup Appliance Command Reference Guide.
Use the Settings > Notification page to configure Call Home from the NetBackup
Appliance Web Console. Click Alert Configuration and enter the details in the
Call Home Configuration pane.
Table 10-1 describes how a hardware failure is reported when the feature is enabled
or disabled.
Call Home enabled When a hardware failure occurs, the following sequence of
alerts occur:
Call Home disabled No data is sent to the Veritas AutoSupport server. Your
system does not report hardware errors to Veritas to enable
faster problem resolution.
The following list contains all the information that is monitored and sent to Veritas
AutoSupport server for analysis.
■ CPU
■ Disk
■ Fan
■ Power supply
■ RAID group
■ Temperatures
■ Adapter
Call Home security 86
About Call Home
■ PCI
■ Fibre Channel HBA
■ Network card
■ Partition information
■ MSDP statistics
■ Storage connections
■ Storage status
■ 52xx Storage Shelf - Status of disk, fan, power supply, and temperature
■ 5330 Primary Storage Shelf - Status of disk, fan, power supply, temperature,
battery backup unit (BBU), controller, volume, and volume group
■ 5330 Expansion Storage Shelf - Status of disk, fan, power supply, and
temperature
■ NetBackup Appliance software version
■ NetBackup version
■ Appliance model
■ Appliance configuration
■ Firmware versions
■ Appliance, storage, and hardware component serial numbers
See “Configuring Call Home from the NetBackup Appliance Shell Menu” on page 86.
See “About AutoSupport ” on page 83.
If you enable Call Home, you can use the Settings > Alerts > CallHome
Registration command to configure the contact details for your appliance by
entering the following information:
Call Home security 87
About Call Home
■ The name of the person who is the first point of contact and responsible for the
appliance.
■ The address of the contact person.
■ The phone number of the contact person.
■ The email address of the contact person.
To learn more about the Main > Settings > Alerts > CallHome commands,
refer to theNetBackup Appliance Command Reference Guide.
For a list of the hardware problems that cause an alert, see the following topics:
See “About Call Home” on page 84.
3 To disable Call Home, run the Main > Settings > Alerts > CallHome
Disable command.
For more information on Main > Settings > Alerts > CallHome commands,
refer to the NetBackup Appliance Command Reference Guide.
3 To add a proxy server, run the Main > Settings > Alerts > CallHome
Proxy Add command.
■ You are prompted to enter the name of the proxy server. The proxy server
name is the TCP/IP address or the fully qualified domain name of the proxy
server.
■ After you have entered a name for the proxy server, you are prompted to
enter the port number for the proxy server.
■ Further, you are required to answer the following:
■ On answering yes, you are prompted to enter a user name for the proxy
server.
■ After you have entered the user name, you are prompted to enter a
password for the user. On entering the required information, the following
message is displayed:
4 To disable proxy settings, run the Main > Settings > Alerts > CallHome
Proxy Disable command.
Further, you can also use the NetBackup Appliance Shell Menu to enable or disable
proxy server tunneling for your appliance. To do so, run the Main > Settings >
CallHome Proxy EnableTunnel and Main > Settings > Alerts > CallHome
Proxy DisableTunnel commands. Proxy server tunneling lets you provide a secure
path through an untrusted network.
The appliance Call Home feature uses the following workflow to communicate with
AutoSupport servers:
■ Access a port to https://receiver.appliance.veritas.com every 24 hours.
■ Perform a self-test operation to https://receiver.appliance.veritas.com.
■ If the appliance encounters an error state, all hardware logs from past three
days are gathered along with the current log.
■ The logs are then uploaded to the Veritas AutoSupport server for further analysis
and support. These error logs are also stored on the appliance. You can access
these logs from /log/upload/<date> folder.
■ If the error state persists three days later, the logs will be re-uploaded.
See “About Call Home” on page 84.
See “About AutoSupport ” on page 83.
About SNMP
The Simple Network Management Protocol (SNMP) is an application layer protocol
that facilitates the exchange of management information between network devices.
It uses either the Transmission Control Protocol (TCP) or the User Datagram
Protocol (UDP) for transport, depending on configuration. SNMP enables network
administrators to manage network performance, find and solve network problems,
and plan for network growth.
SNMP is based on the manager model and agent model. This model consists of a
manager, an agent, a database of management information, managed objects, and
the network protocol.
The manager provides the interface between the human network manager and the
management system. The agent provides the interface between the manager and
the physical devices being managed.
The manager and agent use a Management Information Base (MIB) and a relatively
small set of commands to exchange information. The MIB is organized in a tree
structure with individual variables, such as point status or description, being
represented as leaves on the branches. A numeric tag or object identifier (OID) is
used to distinguish each variable uniquely in the MIB and in SNMP messages.
NetBackup Appliance 2.7.2 supports SNMP v2.
that is associated with it. Each OID consists of the numbers that are separated by
decimal points (for example, 1.3.6.1.4.1.2682.1).
These OIDs form a tree. A MIB associates each OID with a readable label and
various other parameters that are related to the object. The MIB then serves as a
data dictionary that is used to assemble and interpret SNMP messages. This
information is saved as a MIB file.
You can check the details of the SNMP MIB file from the Settings > Notifications
> Alert Configuration page of the NetBackup Appliance Web Console. To configure
the appliance SNMP manager to receive hardware monitoring related traps, click
View SNMP MIB file in the SNMP Server Configuration pane.
You can also view the SNMP MIB file with the Settings > Alerts > SNMP ShowMIB
command in the NetBackup Appliance Shell Menu.
Chapter 11
IPMI security
This chapter includes the following topics:
Users
The following recommendations must be kept in mind while creating IPMI users:
■ Don’t allow accounts with null user name or password.
■ Recommended to have one administrative user.
IPMI security 92
Recommended IPMI settings
Login
The following recommendations must be kept in mind while creating applying login
settings for the IPMI users:
LDAP Settings
Veritas recommends that you should enable LDAP authentication, if possible in
your environment.
SSL Upload
Veritas recommends that you import a new/custom ssl certificate.
Remote Session
Table 11-2 Remote session security settings
Cipher recommendation
■ Do NOT set cipher to zero on the IPMI channel
IPMI security 93
Replacing the default IPMI SSL certificate
.....+++
.+++
e is 65537 (0x10001)
IPMI security 95
Replacing the default IPMI SSL certificate
Note: To avoid extra warnings in your browser, set the CN to the fully qualified
domain name of the IPMI interface. You are about to enter is what is called a
Distinguished Name or a DN.
Country Name (2 letter Enter your Country's name. For example, US.
code) [AU]:
State or Province Name Enter your State's or Province's name. For example, OR.
(full name)
[Some-State]:
Locality Name (eg, city) Enter your Locality name. For example, Springfield.
[]:
Organization Name (eg, Enter your Organization's name. For example, Veritas.
company) [Internet
Widgits Pty Ltd]:
A challenge password Enter the appropriate challenge password, which is the extra
[]: attribute to be sent with your certificate request.
An optional company Enter the appropriate optional company name, which is the
name []: extra attribute to be sent with your certificate request.
3 Sign ipmi.csr with ipmi.key and create a certificate called ipmi.crt that is
valid for 1 year:
-days 365
Signature ok
subject=/C=US/ST=OR/L=Springfield
/O=Veritas/OU=Your OU/
CN=hostname.your.company/
emailAddress=email@your.company
5 Copy ipmi.pem to a host that has access to the appliance's IPMI web interface.
6 Login to your Veritas Remote Management (IPMI web interface).
7 Click Configuration > SSL.
The appliance displays the SSL Upload page.
8 From the SSL Upload page, click Choose File to import the certificate.
9 Select the ipmi.pem and click Upload.
10 A warning may appear that says an SSL certificate already exists, press OK
to continue.
11 To import the key, click Choose File again (notice it says New Privacy Key
next to the button).
12 Select the ipmi.pem and click Upload.
IPMI security 97
Replacing the default IPMI SSL certificate
13 A confirmation appears stating that the certificate and key were uploaded
successfully, press OK to restart the Web service.
14 Close and reopen the Veritas Remote Management (IPMI web interface)
interface to verify that the new certificate is being presented.
Appendix A
Software packages
included in the NetBackup
appliance OS
This appendix includes the following topics:
device-mapper-persistent-data
libidn pam systemtap-client
dhclient libjpeg-turbo pango systemtap-devel
dhcp-common libldb parted systemtap-initscript
diffutils libldb-devel passwd systemtap-runtime
dmidecode libnih patch systemtap-sdt-devel
dmraid libnl pciutils systemtap-server
dmraid-events libpcap pciutils-libs sysvinit-tools
docbook-dtds libpciaccess pcmciautils tar
dos2unix libpng pcre tcl
dosfstools libproxy perl tcp_wrappers
dracut libproxy-bin perl-Compress-Raw-Bziptcp_wrappers-devel
dracut-kernel libproxy-python perl-Compress-Raw-Zlibtcp_wrappers-libs
e2fsprogs libreport perl-Compress-Zlib tcpdump
e2fsprogs-libs libreport-cli perl-HTML-Parser tcsh
ed libreport-compat perl-HTML-Tagset telnet
efibootmgr libreport-filesystem perl-IO-Compress-Base time
eggdbus libreport-plugin-kerneloops
perl-IO-Compress-Bzip tmpwatch
eject libreport-plugin-logger
perl-IO-Compress-Zlib tog-pegasus
elfutils libreport-plugin-mailxperl-libs tog-pegasus-libs
elfutils-devel libreport-plugin-reportuploader
perl-libwww-perl trace-cmd
elfutils-libelf libreport-plugin-rhtsupport
perl-Module-Pluggable traceroute
elfutils-libelf-devel libreport-plugin-ureport
perl-Parse-Yapp tzdata
elfutils-libs libreport-python perl-Pod-Escapes udev
ethtool libselinux perl-Pod-Simple unzip
expat libselinux-devel perl-URI upstart
expect libselinux-python perl-version usbutils
file libselinux-utils perl-XML-Parser usermode
file-devel libsemanage perl-XML-XPath ustr
file-libs libsepol pinentry util-linux-ng
filesystem libsepol-devel pinfo valgrind
findutils libSM pixman vconfig
fipscheck libss pkgconfig vim-common
fipscheck-lib libssh plymouth vim-enhanced
fontconfig libstdc++ plymouth-core-libs vim-filesystem
fontpackages-filesystem
libtalloc plymouth-scripts vim-minimal
fprintd libtalloc-devel pm-utils virt-what
fprintd-pam libtar policycoreutils vlock
freetype libtasn polkit w3m
gamin libtdb popt wget
gawk libtdb-devel popt-devel which
gc libtevent portreserve wireless-tools
gcc libtevent-devel postfix words
GConf libthai ppl xcb-util
gd libtiff prelink xdg-utils
Software packages included in the NetBackup appliance OS 103
List of software packages included in the NetBackup appliance OS
A D
Active Directory user data classification 72
configure authentication 25 data encryption 72
AD supported users KMS support 73
configure server 27 data integrity 71
pre-requisites 27 CRC verification 72
appliance log files end-to-end verification 71
Browse command 61 data security 70
appliance security datacollect
about 10 device logs 62
authentication
AD 20 I
LDAP 20
intrusion detection system
local user 20
about 46
NIS
intrusion prevention system
Kerberos 20
about 45
authorization 35
IPMI security
Administrator 39
recommendations 91
NetBackupCLI user 40
IPMI SSL certificate 93
AutoSupport
IPS policy
customer registration 83
override 51
re-enable 54
B IPsec
Browse command network security 78
appliance log files 61
K
C Kerberos
Call Home authenticate NIS 28
alerts 84
workflow 88 L
Call Home proxy server
LDAP supported users
configuring 87
configure server 26
Collect Log files 59
pre-requisites 26
collect logs
LDAP user
commands 60
configure authentication 24
datacollect 62
local user
log file location 60
configure authentication 23
types of logs 60
log files
introduction 57
Index 105
login banner T
about 29 third party SSL certificates 76
appliance 29
NetBackup 29
U
user 18
M Active Directory 25
Management Information Base (MIB) 89 add 37
admin 18
N Administrator 18
NetBackupCLI AppComm 18
commands 41 authorize 36
network security Kerberos-NIS 25
IPsec 78 LDAP 24
NIS supported users local 23
configure server 28 Maintenance 18
pre-requisites 28 manage role
NIS user permissions 37
configure authentication 25 NetBackupCLI 18
notifications 84 root 18
sisips 18
user authentication
O configure 23
operating system guidelines 26
disabled services 68 user group
major components 67 add 37
security highlights 66 manage role
software packages 98 permissions 37
user name credentials 30
P user role privileges
password NetBackup appliance 38
credentials 30
encryption 30 W
privileges wizard
user role 38 Collect Log files 59
R
replacing
IPMI SSL certificate 93
root 51
S
Simple Network Management Protocol (SNMP) 89
Symantec Data Center Security
about 43
IDS policy 46
IPS policy 45
managed mode 43, 50
unmanaged mode 43, 50