007-011540-001 - RevA - SMC - V5 0 - CRN
007-011540-001 - RevA - SMC - V5 0 - CRN
007-011540-001 - RevA - SMC - V5 0 - CRN
Release Notes
Version: 5.0 Build 1643
Release Notes Issue Date: April 10, 2012
Product Description
SMC is the network management software for the SafeNet High Speed Encryptor product line.
SMC is essentially an always-on Web server and a database, installed on commodity server
hardware.
Users interact with SMC via a Web-based user interface. Users add their SafeNet High Speed
Encryptors to SMC’s database, then click to open the devices’ configurations in the user-friendly
user interface. Users can view, edit, back up, and restore device configurations, and can issue
management commands to devices through SMC.
In addition to configuration, SMC logs SNMP traps from the devices to its database, and
provides a rich event browser to view and search those traps. SMC also facilitates remote,
network-wide firmware upgrades, and produces reports on network inventory and
configuration.
SafeNet Ethernet Encryptor Branch Office (SEE BO) – versions 2.1 & prior
Release Description
SMC 5.0 is a feature enhancement release to version 4.1C and prior releases. This release
includes:
Solaris Version: 5.0 build 1643
Windows Version: 5.0 build 1643
Released Components
SMC 5.0 for Solaris 10 installation: smcSetup.bin
SMC 5.0 for Windows Server 2003 and Windows Server 2008 installation: smcSetup.exe
SMC User’s Guide (English): Web-based Help
SMC Companion User’s Guide: 007-012002-001_SMC_V5.0_Companion_User_Guide.pdf
SMC Installation Guide: 007-012003-001_SMC_V5.0_Installation_Guide.pdf
SMC Data Replication Setup Guide: 007-012004-001_SMC_V5.0_Replication_Guide.pdf
SMC Luna SA Integration Quick Start Guide: 007-012005-001_SMC_Luna_Integration.pdf
SMC Customer Release Notes: 007-011540-001_SMC_v5.0_CRN.pdf
Supported Environments
Server Systems:
Supported Operating Systems:
Solaris™ 10 SPARC platform
Windows Server® 2008 R2
Windows Server® 2008 SP2 (32-bit and 64-bit)
Windows Server® 2003 R2 (32-bit only)
Windows 7® Enterprise (32-bit and 64-bit)
Windows Vista® Business (32-bit and 64-bit)
Windows XP® Professional (32-bit only)
Network Performance:
*Minimum:
Server: 10/100 Mbps throughput
Recommended:
Server: 100 Mbps throughput
*Note: Minimum requirements are for small SafeNet managed networks. No more than
50 managed encryptors are recommended.
Client Systems:
Supported Operating Systems:
Solaris 10
Windows 7, XP, Vista, 2003, and 2008 Server
Supported Browsers:
Mozilla Firefox 3.5 and higher
Internet Explorer 8
Virtualization:
Solaris Zones
VMware
SEE Connection Reports — Generate reports of MAC and VLAN connections table for all
SEE encryptors.
Device Setup Wizard — SafeNet encryptors can be activated and certified with the
device Setup Wizard.
Download SMC server logs from client — SMC server logs can be download onto the
client machine from the browser.
Database Backup job — The SMC database can be periodically backed up for data
recovery.
MySQL binary logging enabled by default — With the binary log, data can be recovered
up to the last update.
Better responsiveness to DMK edit pages — Improved the responsiveness of the DMK
edit pages by avoiding unnecessary immediate field validations.
Discontinued Features
The following features are no longer supported beginning in SMC 5.0.
SafeNet Conversion Encryptor (SCE)
SafeNet HighAssurance Remote (HARemote) – Devices using IPSec to secure the
management communication cannot be managed.
MySQL Clustering
The 'binary and script behavior' option must be enabled in Internet Explorer (IE 8). This
allows the status bar to appear against a transparent background, rather than a grayed
out, opaque background.
The address bar in Internet Explorer displays 'Certificate Error' and highlights the Web
address in red, until the self-signed SafeNet SMC is installed in the Trusted Root
Certification Authorities Store of the machine.
Windows Server 2008
Before installing SMC on Windows Server 2008, refer to the SMC Installation Guide for a
list of firewall port exceptions that need to be configured to make the SMC server and
client components accessible.
High Availability Considerations
Pairing
SMC servers cannot be paired across versions. Due to the potential for changes
within the database schema, pairing across versions is not supported.
Pairing also requires that all SMC servers being paired are able to resolve each
other’s host names. This can be done either automatically (by using the network
DNS server), or manually (by adding the host names to the hosts files of the
respective SMC servers). For the paired nodes with fully qualified domain
name (FQDN), add the hostname without domain name to the hosts file.
Restoring an SMC database to another SMC server, and configuring pairing between
those two servers will not replicate the devices already present in the database.
After restoring the database, but before setting up pairing, go to Administration >
System Configuration > System, delete the property named
com.safenetinc.smc.system.ServerUniqueId, and then restart both servers. Only new
devices (added after the pairing is configured) will be replicated.
Reference: 82354
o Configuring SMC Firmware Download, SNMP Proxy Agent, and SNMP Trap
Listener to Bind with Specific IP Address
Firmware Download, SNMP Proxy Agent, and SNMP Trap Listener will default to
the value of the smc.server.hostaddress property, as set in the file
<SMC_INSTALL_DIRECTORY>/jboss/server/default/conf/system.properties.
After setting the property, restart the SMC server. An SMC user with
administrator privileges is required to stop the SMC server:
If the delay negatively affects the SMC interface to the device, SMC’s SNMP timeout
property can be adjusted to accommodate the device response times. Configure the
setting by navigating to Administration > System Configuration > SSE/SAEII/SEE.
Enter a valid value (in seconds) in the Connection Timeout field.
As a result, it is not possible to download a software image (or receive traps) via the
management interface of an in-band, remote-managed encryptor that is not the in-
band gateway encryptor.
To eliminate these problems, ensure that if both the management and in-band
interfaces are configured on a remote-managed encryptor, then there are active
routed paths back to the SMC workstation for both interfaces (especially the in-band
interface).
Reference: 72713
Link Encryptors
There is no error checking for the correct SLE device type. Select a valid SLE device
type in the drop-down menu and double-check to ensure it matches correctly with
the hardware device type.
Reference: 33265
The configuration timeout settings for SLE devices are longer than expected;
however, no action is required by the user. The configuration timeout is set to an
Exponential Backoff algorithm, where Timeout = 5 and Retry = 3, retransmit occurs
at 0 (first), 5 (R1) + 10(R2) + 20(R3) + 40(final timeout) = 75 secs.
Reference: 33438
When opened with third-party programs such as Microsoft Excel, the contents of
CSV files may be interpreted by the program in use. Refer to the third-party
documentation for control of formatting for display purposes.
If SMC is running on a system that does not meet SMC’s system requirements, the
keystore migration from SMC’s database to the Luna hardware security module fails
with an exception. The workaround to this issue is to add the following property in
SMC_HOME/jboss/server/default/conf/system.properties:
smc.bootstrap.start.luna=true and then restart the SMC server.
102124 H Windows: SMC does not report failure message in the server.log when another
ftp server is running
102125 C Windows: SNMP Agent does not report failure when the port 162 was occupied
102126 C Windows SMC does not start SNMP Agent service when the port 161/162 was
released.
106612 H Restore db utility always complains about Access denied
109192 M MAC Mode Devices Do Not Display Inband VLAN Table in Connections Panel
111015 H Manage Global Search privilege does not give user access to manage.
123619 M Page Refresh Issue: Working bar goes away long before refresh the page
128891 M Sorting on Device List Page does not work correctly on IP Addresses
133370 H Pairing - Certificate renewal fails when choose preferred from a pairing node-
EXCEPTION = Keyset not found
We have attempted to make these documents complete, accurate, and useful, but we cannot guarantee them to be perfect. When we discover
errors or omissions, or these issues are brought to our attention, we endeavor to correct them in succeeding releases of the product.