ebook img

Veritas NetBackup™ Appliance Security Guide PDF

105 Pages·2016·1.48 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Veritas NetBackup™ Appliance Security Guide

Veritas NetBackup™ Appliance Security Guide Release 2.7.2 NetBackup 52xx and 5330 Veritas NetBackup™ Appliance Security Guide Documentationversion:2.7.2 Legal Notice Copyright©2016VeritasTechnologiesLLC.Allrightsreserved. Veritas,theVeritasLogo,NetBackup,andStorageFoundationaretrademarksorregistered trademarksofVeritasTechnologiesLLCoritsaffiliatesintheU.S.andothercountries.Other namesmaybetrademarksoftheirrespectiveowners. ThisproductmaycontainthirdpartysoftwareforwhichVeritasisrequiredtoprovideattribution tothethirdparty(“ThirdPartyPrograms”).SomeoftheThirdPartyProgramsareavailable underopensourceorfreesoftwarelicenses.TheLicenseAgreementaccompanyingthe Softwaredoesnotalteranyrightsorobligationsyoumayhaveunderthoseopensourceor freesoftwarelicenses.PleaseseetheThirdPartyLegalNoticeAppendixtothisDocumentation orTPIPReadMeFileaccompanyingthisproductformoreinformationontheThirdParty Programs. Theproductdescribedinthisdocumentisdistributedunderlicensesrestrictingitsuse,copying, distribution,anddecompilation/reverseengineering.Nopartofthisdocumentmaybe reproducedinanyformbyanymeanswithoutpriorwrittenauthorizationofVeritasTechnologies LLCanditslicensors,ifany. THEDOCUMENTATIONISPROVIDED"ASIS"ANDALLEXPRESSORIMPLIED CONDITIONS,REPRESENTATIONSANDWARRANTIES,INCLUDINGANYIMPLIED WARRANTYOFMERCHANTABILITY,FITNESSFORAPARTICULARPURPOSEOR NON-INFRINGEMENT,AREDISCLAIMED,EXCEPTTOTHEEXTENTTHATSUCH DISCLAIMERSAREHELDTOBELEGALLYINVALID.VERITASTECHNOLOGIESLLC SHALLNOTBELIABLEFORINCIDENTALORCONSEQUENTIALDAMAGESIN CONNECTIONWITHTHEFURNISHING,PERFORMANCE,ORUSEOFTHIS DOCUMENTATION.THEINFORMATIONCONTAINEDINTHISDOCUMENTATIONIS SUBJECTTOCHANGEWITHOUTNOTICE. TheLicensedSoftwareandDocumentationaredeemedtobecommercialcomputersoftware asdefinedinFAR12.212andsubjecttorestrictedrightsasdefinedinFARSection52.227-19 "CommercialComputerSoftware-RestrictedRights"andDFARS227.7202,etseq. "CommercialComputerSoftwareandCommercialComputerSoftwareDocumentation,"as applicable,andanysuccessorregulations,whetherdeliveredbyVeritasasonpremisesor hostedservices.Anyuse,modification,reproductionrelease,performance,displayordisclosure oftheLicensedSoftwareandDocumentationbytheU.S.Governmentshallbesolelyin accordancewiththetermsofthisAgreement. VeritasTechnologiesLLC 500EMiddlefieldRoad MountainView,CA94043 http://www.veritas.com Technical Support TechnicalSupportmaintainssupportcentersglobally.TechnicalSupport’sprimary roleistorespondtospecificqueriesaboutproductfeaturesandfunctionality.The TechnicalSupportgroupalsocreatescontentforouronlineKnowledgeBase.The TechnicalSupportgroupworkscollaborativelywiththeotherfunctionalareaswithin thecompanytoansweryourquestionsinatimelyfashion. Oursupportofferingsincludethefollowing: ■ Arangeofsupportoptionsthatgiveyoutheflexibilitytoselecttherightamount ofserviceforanysizeorganization ■ Telephoneand/orWeb-basedsupportthatprovidesrapidresponseand up-to-the-minuteinformation ■ Upgradeassurancethatdeliverssoftwareupgrades ■ Globalsupportpurchasedonaregionalbusinesshoursor24hoursaday,7 daysaweekbasis ■ PremiumserviceofferingsthatincludeAccountManagementServices Forinformationaboutoursupportofferings,youcanvisitourwebsiteatthefollowing URL: www.veritas.com/support Allsupportserviceswillbedeliveredinaccordancewithyoursupportagreement andthethen-currententerprisetechnicalsupportpolicy. Contacting Technical Support CustomerswithacurrentsupportagreementmayaccessTechnicalSupport informationatthefollowingURL: www.veritas.com/support BeforecontactingTechnicalSupport,makesureyouhavesatisfiedthesystem requirementsthatarelistedinyourproductdocumentation.Also,youshouldbeat thecomputeronwhichtheproblemoccurred,incaseitisnecessarytoreplicate theproblem. WhenyoucontactTechnicalSupport,pleasehavethefollowinginformation available: ■ Productreleaselevel ■ Hardwareinformation ■ Availablememory,diskspace,andNICinformation ■ Operatingsystem ■ Versionandpatchlevel ■ Networktopology ■ Router,gateway,andIPaddressinformation ■ Problemdescription: ■ Errormessagesandlogfiles ■ TroubleshootingthatwasperformedbeforecontactingTechnicalSupport ■ Recentsoftwareconfigurationchangesandnetworkchanges Licensing and registration Ifyourproductrequiresregistrationoralicensekey,accessourtechnicalsupport WebpageatthefollowingURL: www.veritas.com/support Customer service CustomerserviceinformationisavailableatthefollowingURL: www.veritas.com/support CustomerServiceisavailabletoassistwithnon-technicalquestions,suchasthe followingtypesofissues: ■ Questionsregardingproductlicensingorserialization ■ Productregistrationupdates,suchasaddressornamechanges ■ Generalproductinformation(features,languageavailability,localdealers) ■ Latestinformationaboutproductupdatesandupgrades ■ Informationaboutupgradeassuranceandsupportcontracts ■ Adviceabouttechnicalsupportoptions ■ Nontechnicalpresalesquestions ■ IssuesthatarerelatedtoCD-ROMs,DVDs,ormanuals Support agreement resources Ifyouwanttocontactusregardinganexistingsupportagreement,pleasecontact thesupportagreementadministrationteamforyourregionasfollows: Worldwide(exceptJapan) [email protected] Japan [email protected] Contents Technical Support ............................................................................................ 4 Chapter 1 About the NetBackup Appliance Security Guide .......................................................................................... 10 AbouttheNetBackupApplianceSecurityGuide.................................. 10 Chapter 2 User authentication ........................................................... 18 AboutuserauthenticationontheNetBackupappliance........................ 18 UsertypesthatcanauthenticateontheNetBackup appliance........................................................................ 20 Aboutconfiguringuserauthentication............................................... 23 Generic user authentication guidelines ....................................... 26 AboutauthenticatingLDAPusers.................................................... 26 AboutauthenticatingActiveDirectoryusers....................................... 27 AboutauthenticatingKerberos-NISusers.......................................... 28 Abouttheapplianceloginbanner..................................................... 29 Aboutusernameandpasswordspecifications................................... 30 Chapter 3 User authorization ............................................................. 35 AboutuserauthorizationontheNetBackupappliance.......................... 35 AboutauthorizingNetBackupapplianceusers.................................... 36 NetBackupapplianceuserroleprivileges.................................... 38 AbouttheAdministratoruserrole..................................................... 39 AbouttheNetBackupCLIuserrole................................................... 40 Chapter 4 Intrusion prevention and intrusion detection systems .......................................................................... 42 AboutSymantecDataCenterSecurityontheNetBackup appliance.............................................................................. 43 AbouttheNetBackupapplianceintrusionpreventionsystem................. 45 AbouttheNetBackupapplianceintrusiondetectionsystem................... 46 ReviewingSDCSeventsontheNetBackupappliance..........................47 Contents 8 RunningSDCSinunmanagedmodeontheNetBackup appliance.............................................................................. 50 RunningSDCSinmanagedmodeontheNetBackupappliance............. 50 OverridingtheNetBackupapplianceintrusionpreventionsystem policy................................................................................... 51 Re-enablingtheNetBackupapplianceintrusionpreventionsystem policy................................................................................... 54 Chapter 5 Log files ................................................................................ 57 AboutNetBackupappliancelogfiles.................................................57 AbouttheCollectLogfileswizard.................................................... 59 ViewinglogfilesusingtheSupportcommand..................................... 60 WheretofindNetBackupappliancelogfilesusingtheBrowse command ............................................................................. 61 GatheringdevicelogswiththeDataCollectcommand.......................... 62 Chapter 6 Operating system security .............................................. 66 AboutNetBackupapplianceoperatingsystemsecurity......................... 66 MajorcomponentsoftheNetBackupapplianceOS............................. 67 DisabledserviceaccountsontheNetBackupappliance....................... 68 VulnerabilityscanningoftheNetBackupappliance.............................. 69 Chapter 7 Data security ....................................................................... 70 AboutDataSecurity...................................................................... 70 AboutDataIntegrity...................................................................... 71 AboutDataClassification............................................................... 72 AboutDataEncryption .................................................................. 72 KMS support ........................................................................ 73 Chapter 8 Web security ....................................................................... 75 AboutSSLcertification.................................................................. 75 Implementingthird-partySSLcertificates........................................... 76 Chapter 9 Network security ................................................................ 78 AboutIPsecChannelConfiguration.................................................. 78 AbouttheNetBackupAppliance52xxports........................................80 Contents 9 Chapter 10 Call Home security ............................................................ 83 About AutoSupport ...................................................................... 83 AboutCallHome.......................................................................... 84 ConfiguringCallHomefromtheNetBackupApplianceShell Menu ............................................................................. 86 EnablinganddisablingCallHomefromtheNetBackupAppliance ShellMenu......................................................................87 ConfiguringaCallHomeproxyserverfromtheNetBackup ApplianceShellMenu........................................................87 UnderstandingtheCallHomeworkflow....................................... 88 About SNMP ............................................................................... 89 AbouttheManagementInformationBase(MIB)............................ 89 Chapter 11 IPMI security ....................................................................... 91 IntroductiontoIPMIconfiguration..................................................... 91 RecommendedIPMIsettings.......................................................... 91 ReplacingthedefaultIPMISSLcertificate......................................... 93 Appendix A Software packages included in the NetBackup appliance OS ................................................................ 98 ListofsoftwarepackagesincludedintheNetBackupappliance OS ...................................................................................... 98 Index .................................................................................................................. 104 1 Chapter About the NetBackup Appliance Security Guide Thischapterincludesthefollowingtopics: ■ AbouttheNetBackupApplianceSecurityGuide About the NetBackup Appliance Security Guide TheNetBackupappliancesaredevelopedfromtheirinceptionwithsecurityasa primaryneed.Eachelementoftheappliance,includingitsLinuxoperatingsystem andthecoreNetBackupapplication,istestedforvulnerabilitiesusingbothindustry standardsandadvancedsecurityproducts.Thesemeasuresensurethatexposure tounauthorizedaccessandresultingdatalossortheftisminimized. EachnewversionofNetBackupappliancesoftwareandhardwareisverifiedfor vulnerabilitiesbeforerelease.Dependingontheseverityofissuesfound,Veritas willaddressthemusingapatchorthroughascheduledmajorrelease.Toreduce theriskofunknownthreats,Veritasregularlyupdatesthethird-partypackagesand modulesthatareusedintheproductaspartofregularmaintenancereleasecycles. ThegoalofthisguideistodescribethesecurityfeaturesimplementedinNetBackup Appliance2.7.2andincludesthefollowingchaptersandsub-sections: NetBackup appliance user authentication ThischaptertalksabouttheauthenticationfeaturesoftheNetBackupappliance andincludesthefollowingsections:

Description:
Each element of the appliance, including its Linux operating system and the core NetBackup application, is tested for vulnerabilities using both
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.