Sec Config Guide
Sec Config Guide
August 2020
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2016 - 2021 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Other trademarks may be trademarks of their respective owners.
Contents
Tables........................................................................................................................................... 5
Preface.........................................................................................................................................................................................6
Contents 3
Communications specifications - VPLEX Metro system....................................................................................33
Communications specifications - VPLEX Local system..................................................................................... 35
Network Encryption....................................................................................................................................................36
Creating a local Certification Authority..................................................................................................................36
Finding the host certificates's SHA256, SHA1 and (for GUI users) MD5 fingerprints...............................37
Finding the SSH key fingerprint (for SSH users)................................................................................................ 38
Configurable HTTPS/TLS protocol.........................................................................................................................38
Data security settings................................................................................................................................................ 39
4 Contents
Tables
1 Typographical conventions...................................................................................................................................... 7
2 Quad-engine cluster director IP addresses........................................................................................................ 19
3 Dual-engine cluster director IP addresses......................................................................................................... 20
4 Single-engine cluster director IP addresses......................................................................................................20
5 Last Octets of Director IP Addresses.................................................................................................................20
6 IPv6 support on VPLEX components................................................................................................................. 22
7 Metro node user accounts and privileges.......................................................................................................... 23
8 Description of roles in Role-based Access Control......................................................................................... 25
9 Default password policies...................................................................................................................................... 26
10 VPLEX component log files....................................................................................................................................31
11 Communication in a VPLEX Metro system........................................................................................................34
12 Communication in a VPLEX Local system......................................................................................................... 35
Tables 5
Preface
As part of an effort to improve its product lines, Dell EMC periodically releases revisions of its software and hardware.
Therefore, some functions described in this document might not be supported by all versions of the software or hardware
currently in use. The product release notes provide the most up-to-date information on product features.
Contact your Dell EMC technical support professional if a product does not function properly or does not function as described
in this document.
NOTE: This document was accurate at publication time. Go to Dell EMC Online Support (https://www.dell.com/support)
to ensure that you are using the latest version of this document.
Purpose
This document is part of the VPLEX documentation set, and describes the VPLEX features and use cases, configuration options,
VPLEX software and its upgrade, and the hardware overview.
Audience
This guide is intended for use by customers who wish to understand the software and hardware features of VPLEX, the use
cases of VPLEX, product offerings, and the configuration options.
Related documents (available on Dell EMC Online Support and SolVe) include:
● Release Notes for the metro node appliance
● Product Guide or the metro node appliance
● Metro node Hardware Installation Guide
● Configuration and Installation Guide for the metro node appliance
● Security Configuration Guide for the metro node appliance
● CLI Reference Guide for the metro node appliance
● Administration Guide for the metro node appliance
● Online Help for the metro node appliance
● REST API v2 for the metro node appliance
● Open Source Licenses Guide for the metro node appliance
● Hardware Reference Guide for the metro node appliance
● Procedures provided through the SolVe
CAUTION: Indicates a hazardous situation which, if not avoided, will result in death or serious injury.
CAUTION: Indicates a hazardous situation which, if not avoided, could result in death or serious injury.
CAUTION: Indicates a hazardous situation which, if not avoided, could result in minor or moderate injury.
Typographical conventions
Dell EMC uses the following type style conventions in this document:
6 Preface
Table 1. Typographical conventions
Bold Used for names of interface elements, such as names of windows, dialog boxes, buttons,
fields, tab names, key names, and menu paths (what the user specifically selects or clicks)
italic Used for full titles of publications referenced in text
Monospace Used for:
● System code
● System output, such as an error message or script
● Pathnames, filenames, prompts, and syntax
● Commands and options
Monospace italic Used for variables
Monospace bold Used for user input
[] Square brackets enclose optional values
| Vertical bar indicates alternate selections - the bar means "or"
{} Braces enclose content that the user must specify, such as x or y or z
... Ellipses indicate nonessential information omitted from the example
Product information
For documentation, release notes, software updates, or information about Dell EMC products, go to Dell EMC Online Support at
https://www.dell.com/support.
Technical support
Go to Dell EMC Online Support and click Support. You will see several options for contacting Dell EMC Technical Support. Note
that to open a service request, you must have a valid support agreement. Contact your Dell EMC sales representative for details
about obtaining a valid support agreement or with questions about your account.
Online communities
Visit Dell EMC Community Network (DECN) at https://www.dell.com/community/Dell-Community/ct-p/English for peer
contacts, conversations, and content on product support and solutions. Interactively engage online with customers, partners,
and certified professionals for all Dell EMC products.
Your comments
Your suggestions will help us continue to improve the accuracy, organization, and overall quality of the user publications. Send
your opinions of this document to vplex.doc.feedback@dell.com.
Preface 7
1
VPLEX overview
An EMC® VPLEX® cluster consists of one, two, or four engines (each containing two directors), and a management server. A
dual-engine or quad-engine cluster also contains a pair of Fibre Channel switches for communication between directors.
Each engine is protected by a standby power supply (SPS), and each Fibre Channel switch gets its power through an
uninterruptible power supply (UPS). In a dual-engine or quad-engine cluster, the management server also gets power from
a UPS.
The management server has a public Ethernet port, which provides cluster management services when connected to the
customer network. The management server can also provide call-home services through the public Ethernet port by connecting
to an EMC Secure Remote Support (ESRS) gateway deployed on the same network. The ESRS gateway is also used by EMC
personnel to provide remote service.
Two VPLEX implementations are available:
● VPLEX Local (single cluster)
● VPLEX Metro (two clusters separated by synchronous distances)
In a VPLEX Metro implementation, the clusters are connected over IP between the management servers.
VPLEX user authentication is configured locally on the management server or remotely on an OpenLDAP or Active Directory
server which integrates with Unix using Service for UNIX 3.5, Identity Management for UNIX, or other authentication service.
A management server in each VPLEX cluster authenticates users against account information kept on its local file system or
against the LDAP/AD server. An authenticated user can manage resources in the local cluster.
In a VPLEX Metro, users authenticated by either management server can manage all resources in both clusters. Figure 1 shows a
VPLEX cluster configuration (quad system) example.
8 VPLEX overview
Engine 4, Director B ON
I
O
OFF
ON
I
O
OFF
Engine 4, Director A
SPS 4B SPS 4A
ON ON
I I
O O
OFF OFF
SPS 3B SPS 3A
Laptop tray
Fibre Channel switch B
UPS B
Fibre Channel switch A
UPS A
OFF OFF
O O
I I
Management server
ON ON
SPS 2B SPS 2A
OFF OFF
O O
I I
ON ON
SPS 1B SPS 1A
VPLX-000228
VPLEX overview 9
Figure 2. VPLEX Cluster Configuration (VS6)
10 VPLEX overview
2
Security recommendations
While the Security Configuration Guide must be reviewed in its entirety, this segment serves to check most important security
recommendations of Dell EMC to ensure the security of your data and environment.
● Given the elevated permissions that are granted to the service account, its password must be changed to better protect
metro node from misuse or abuse of those privileges. Service account password and iDRAC root password are changed
automatically during initial system configuration.
● Given the elevated permissions that are granted to the iDRAC root account, its password must be changed to better protect
metro node from misuse or abuse of those privileges. Use the command vplex_system_config --idrac to change the
password.
● To retrieve the auto-generated password, run /opt/dell/vplex/system_config/bin/
system_config_collect.py --SHOW-IDRAC-PWD.
Security recommendations 11
3
VPLEX management server operating system
and networking
The operating system (OS) of the VPLEX management server is based on Novell SUSE Linux Enterprise Server. The
management server in GeoSynchrony releases 5.3 to 5.5.2 and patches run SUSE Linux Enterprise Server 11 patch 3. Starting
release 6.0, the management server, including MMCS-A and MMCS-B on VS6, runs SUSE Linux Enterprise Server 11 Service
Pack 4,
The operating system has been configured to meet EMC security standards by disabling or removing unused services and
packages, and protecting access to network services through a firewall.
Used packages are hardened with security updates.
A VS2 management server has four Ethernet ports, identified as eth0 through eth3 by the operating system, shown in the
figure below. A 1 Gb/s public management port (eth3) is the only Ethernet port in the VPLEX rack that may be connected to
an external management LAN. Other components in the rack are connected to two redundant private management Ethernet
networks, connected to the management server's eth0 and eth2 ports. A service port (eth1) can be connected to a local laptop,
providing access to the same services as a host on the management LAN.
In a VS6 system, the management server module (MMCS-A and MMCS-B) is located in the first engine on the cluster. All
the remaining engines will have Akula management modules for the management connectivity. MMCS A is the Management
interface to a public network and to the other VPLEX components in the cluster.
Customer network
connection
Engine 1
3x
0
0
0
1
DC DC
1
1
1
P
IB
AC AC
2
2
2
2
3
3
3
3
3
2
2
2
2
AC AC
IB
P
1
1
1
DC DC
0
0
0
x3
Topics:
• Accessing the management server
https://management_server_public_IP_address
https://[mgmtserver_ipv6_addr]
For example:
https://[3ffe:80c0:22c:803c:215:17ff:fed3:207]/smsflex/VPlexConsole.html
NOTE: Accessing the metro node UI or the metro node CLI over IPv6 is possible only if the client machine is also in an IPv6
network. The readonly user has no UI access.
The UI encrypts all traffic using a server certificate. Creating a host certificate provides more information.
NOTE: The UI has a timer that logs the user out after 10 minutes of inactivity. You can modify the timeout value to a
maximum of 12 hours.
Although you might have already secured the network connections between two VPLEX Metro clusters, the management
servers must establish an explicit VPN connection, to acknowledge that the remote management server has full management
control over the local cluster and its resources.
The VPLEX management server uses strongSwan, an open source implementation of IPsec for Linux.
Prerequisites
To use SCP to transfer files to and from the management server, you must have shell access.
Files that are transferred with SCP into or out of the management server can be viewed in the contexts /management-
server/users/share/in and /management-server/users/share/out respectively. All users see identical output
(independent of file ownership) under these in and out contexts. Only the owner of the file (admin or service users) can
delete a file.
For example, if user testuser1 (with no shell access) uses SCP to transfer a file named a.txt into the management server,
anyone logged into the management server will see a.txt displayed in the /management-server/users/share/in
context. No one other than testuser1 (or admin or service) can delete a.txt from the management server.
service and admin users are authorized to delete any existing file in the SCP sub-directories, using the CLI rm command. Other
users are only authorized to delete files to which they have access. See the rm command in the EMC VPLEX CLI Reference
Guide for details.
To modify permissions for SCP file transfers to and from the management server, do the following.
VPlexcli:/management-server/users/local/testuser1> ls
Name Value
------------ ---------
role-name vplexuser
shell-access false
user-name testuser1
2. Run the following examples to test SCP file transfers for restricted shell user testuser1.
a. Transfer files from a remote server and verify the file transfer was successful by listing the management server SCP in
context.
VPlexcli:/> ll /management-server/share/in/
Name
---------------
logfile
loginbanner.txt
monitor.xml
b. Transfer files from the management server to an external host and verify the result in the management server. The file
should be present in shell location /diag/share/out/. This path equates to /managementserver/share/out/ in
the CLI.
VPlexcli:/> ll /management-server/share/out/
Name
--------
testfile
c. Transfer files to a management server directory that is inaccessible to the shell restricted user testuser1 using scp.
Use SCP to transfer a file from the management server to an external host. The file is present in location /tmp/
d. Delete a.txt from the SCP share/in context using the rm command.
VPlexcli:/management-server/share/in> ls
a.txt b.txt
VPlexcli:/management-server/share/in> rm a.txt
VPlexcli:/management-server/share/in> ls
b.txt
Steps
1. Launch PuTTY.exe, and configure the PuTTY window as shown in the figure below:
● Server address — Public IP address of the VPLEX management server.
● Session name — Type a name for the PuTTY session you are configuring. This allows you to load the saved session if you
need to reconnect later, eliminating the need to configure the individual parameters again.
● Default settings — Verify, and set as shown if necessary.
MMCS IP Addresses
This table lists the IP addresses of the MMCS modules on engine-1 of VPLEX VS6 systems.
IP Addresses
Cable Director IP Address
Cable From To If cable is in Cluster 1 If cable is in Cluster 2
ID in
Figure
A1 MMCS-A Management A Eng-2 MM-A LAN Service Director-1-1-A, subnet B Director-2-1-A, subnet B
Fabric connector port
128.221.253.35 128.221.253.67
A2 Eng-2 MM-A LAN Eng-3 MM-A LAN Service Director-1-2-A, subnet B Director-2-2-A, subnet B
Management port port
128.221.253.37 128.221.253.69
A3 Eng-3 MM-A LAN Eng-4 MM-A LAN Service Director-1-3-A, subnet B Director-2-3-A, subnet B
Management port port
128.221.253.39 128.221.253.71
B2 Eng-2 MM-B LAN Eng-3 MM-B LAN Service Director-1-2-B, subnet A Director-2-2-B, subnet A
Management port port
128.221.252.38 128.221.252.70
B3 Eng-3 MM-B LAN Eng-4 MM-B LAN Service Director-1-3-B, subnet A Director-2-3-B, subnet A
Management port port
128.221.252.40 128.221.252.72
22 Implementing IPv6
6
Security configuration settings
This section provides an overview of user accounts and privileges.
Topics:
• User roles, accounts, and privileges
1. The first user who attempts to log in as admin is prompted to change the admin password before logging in.
2. Given the elevated permissions that are granted to the service account, its password must be changed in order to better
protect metro node from misuse or abuse of those privileges. Changing the service account password provides more
information.
Customers who do not want to use an external LDAP server for maintaining user accounts create their user accounts on the
metro node system itself.
Metro node is pre-configured with two default user accounts: admin and service.
See the Dell EMC CLI Guide for metro node for information about the commands used to configure user authentication.
Topics:
• Role-based access control feature overview
• LDAP/AD user authentication
• Password policy
• Synchronizing service account password to MMCS peer
NOTE: If you do not have shell access, you can only access a single directory when uploading and downloading files.
Role descriptions
This topic describes roles supported under role-based access.
Shell access is turned off by default for all new metro node accounts. Roles are defined as follows:
● securityadmin - This role is to be used by the metro node administrator at the customer site. There is only one securityadmin
account allowed in the management server. securityadmin has the same permissions as the vplexuser role yet also manages
user authorization and authentication (creating and deleting accounts).
● service - This role is to be used by authorized Dell EMC service personnel only in order to configure metro node.
● Metro node user - This role is the basic minimum-access metro node user account. Best practices encourage the majority of
users be assigned this role with a unique customized account name. Limit assigning securityadmin roles as much as possible
to ensure security in your installation. Metro node user role accounts correspond to accounts created by the admin as well
as authorized metro node LDAP accounts.
● readonly - The readonly role limits users to performing read-only commands with the CLI, ensuring the user will not invoke
commands that damage or inhibit metro node functionality. It also provides a method of ensuring that automated monitoring
tools/scripts (CLI or REST) don't accidentally invoke damaging or unintended commands. The Admin can create one or more
accounts that have the readonly role. Metro node user role accounts (as well as authorized metro node LDAP accounts)
created by the Administrator may be defined as readonly when deemed necessary.
Current admin and service users continue to have shell access. It is possible for the Administrator to turn shell access to
service on or off per account basis as described in this document.
Password policy
Details password policies and default values
The metro node management server uses a Pluggable Authentication Module (PAM) infrastructure to enforce minimum
password quality. It uses pam_cracklib, a library that checks for dictionary words, to check potential passwords.
In Release 7.0 and later, the management server uses the default value for the password policies listed in the Default password
policies table, and you can configure each password policy to meet your specific needs. The new value will be updated in the
appropriate configuration file, and existing users will be updated with the new configuration. Refer to the Metro node CLI Guide
for information on the commands used to set password policies and the values allowed.
Note the following:
● Password policies do not apply to users configured using the LDAP server.
● The Password inactive days policy does not apply to the admin account to protect the admin user from account lockouts.
● During the management server software upgrade, an existing user’s password is not changed−− only the user’s password
age information changes.
● You must be an admin user to configure a password policy.
Steps
1. Launch PuTTY (or a similar SSH client), and establish a connection to the public IP address of the metro node management
server.
2. Log in with username admin.
a. If a user first time logs in with username admin, then the user is prompted to change the admin password.
b. In the metro node, the Admin account password must be changed on all nodes individually.
3. From the Linux shell prompt, type this command to connect to the VPlexcli:
vplexcli
4. From the VPlexcli prompt, type the following command:
Steps
1. Launch PuTTY or a similar SSH client, and establish a connection to the public IP address of the metro node management
server.
2. Log in with username admin.
3. From the Linux shell prompt, to connect to the Vplexcli, type the command vplexcli.
4. From the VPlexcli prompt, to view the user details, type the command user list.
Steps
1. Launch PuTTY (or a similar SSH client), and establish a connection to the public IP address of the metro node management
server.
2. Log in with the applicable username.
3. From the Linux shell prompt, type this command to connect to the VPlexcli:
vplexcli
4. Log in with username admin.
5. From the VPlexcli prompt, type the following command:
Resetting passwords
A user with an admin account can reset passwords for other users as follows:
Steps
1. Launch PuTTY (or a similar SSH client), and establish a connection to the public IP address of the metro node management
server.
2. Log in with username admin.
3. From the Linux shell prompt, type this command to connect to the VPlexcli:
vplexcli
4. Log in with username admin.
5. From the VPlexcli prompt, type the following command:
Steps
1. Launch PuTTY (or a similar SSH client), and establish a connection to the public IP address of the metro node management
server.
2. Log in with username admin.
3. From the Linux shell prompt, type this command to connect to the VPlexcli:
vplexcli
4. Log in with username admin.
ConnectEMC /var/log/ConnectEMC/logs/ConnectEMC.log
files
Firewall /var/log/firewall
IP WAN COM
A metro node Metro system does not support native encryption over an IP WAN-COM link. It is recommended that you deploy
an external encryption solution such as IPSec to achieve data confidentiality and end point authentication over IP WAN COM
links between clusters.
Th metro node uses the TCP protocol for its IP WAN-COM communications. Configure TCP ports on the firewall for IP
WAN-COM communications. If the firewall type is filter and not proxy, you must open the following firewall ports:
● TCP ports
○ Port 61484
○ Port 61483
○ Port 61482
○ Ports 32768 to 61000
Accessibility
To establish secure communication, note the following:
● The following protocols must be allowed on the customer firewall (both in the outbound and inbound filters):
# Encapsulating Security Payload (ESP): IP protocol number 50
# Authentication Header (AH): IP protocol number 51
● The following ports must be allowed on the customer firewall:
# Internet Key Exchange (IKE): UDP port 500
# NAT Traversal in the IKE (IPsec NAT-T): UDP port 4500
# Secure Shell (SSH): TCP port 22
● Static IP addresses must be assigned to the public ports on each management server (eth3) and the public port in the
Cluster Witness Server. If these IP addresses are in different subnets, the IP management network must be able to route
packets between all such subnets.
● IP management network must be capable of transferring SSH traffic between management servers and Cluster Witness
Server.
● IP management network must be capable of transferring ICMP traffic between management servers and Cluster Witness
Server in order to enable configuration, upgrade, and diagnostics of Cluster Witness.
● The required minimum value for Maximum Transmission Unit (MTU) is 1500 bytes. Configure MTU as 1500 or larger.
NOTE: The IP management network must not be able to route to the following reserved metro node subnets:
128.221.252.0/24, 128.221.253.0/24, and 128.221.254.0/24.
Port Usage
The following table lists all the network ports and services used by metro node components. This information, along with the
firewall settings is needed to use the product.
NOTE: ICMP/Ping is required between the metro node management server (cluster 1) and external NTP.
This table describes the possible communication between the VPLEX components in a VPLEX Metro system.
Legend:
● A - VPLEX Management Client
● B - Management Server 1
● C - Management Server 2
● D - VPLEX Cluster Witness
● E - ESRS Server
This table describes the possible communication between the VPLEX components in a VPLEX Local system.
Legend:
● A - VPLEX Management Client
● B - Management Server 1
● C - ESRS Server
Network Encryption
The metro node management server supports SSH through the sshd daemon provided by the FIPS compliant OpenSSH
package. It supports version 2 of the SSH protocol. When the management server starts for the first time, the sshd daemon
generateskey-pairs (private and public key) for communication with SSH clients. rsa, dsa and ecdsa key-pairs are
generated to support communication with SSH version 2 clients.
The HTTPS protocol and the IPsec VPN use a X.509 host certificate to identify the server and encrypt all traffic. X.509 host
certificates use a 2048 bit host key. During initial setup of a metro node cluster, a local Certification Authority (which signs the
host certificate request) is created automatically.
Metro node supports a corporate Certification Authority signing the host certificate requests. Users can import the corporate
Certificate Authority signed CA, host certificate and key file. The IPSec encryption can use RSA or ECDSA cryptography
generated key-pair certificates. You can use only one type (RSA or ECDSA) in configuring VPN in all the three components
of metro node, for example, the two management servers and the cluster witness server. Note that for a metro node Metro
configuration, the host certificates for both web and VPN to be imported on both clusters should be signed and created using
the same CA certificate.
To import the corporate Certificate Authority signed certificates, see the metro node CLI Guide.
NOTE: Host certificates are created as a part of EZsetup during a first time installation.
The VPlexcli command security create-host-certificate generates a host certificate request and signs it with the Certification
Authority certificate created in the Creating a local Certification Authority on page 36. By default, this command creates the
following:
Finding the host certificates's SHA256, SHA1 and (for GUI users)
MD5 fingerprints
Steps
1. Type the following command:
Output example:
SHA256
Fingerprint=91:65:4C:02:80:C0:C8:54:24:4A:71:2B:BF:C1:D5:3C:08:A2:2B:36:BC:7B:3D:A2:B3
:8A:72:83:66:E1:36:25
Output example:
MD5 Fingerprint=6E:2C:A5:8E:86:11:45:26:02:09:62:97:6F:18:FD:62
Steps
1. At the Linux shell prompt, type the following command:
Output example:
Output example:
Output example:
Steps
1. Enter the set sslversion command to set the TLS version for a Web server HTTPS connection.
Use the following command format:
NOTE: After entering the CLI command, restart the Web server with the webserver restart command to apply the
changes.
$6$<salt>$<encrypted>