EMC® ® Network Server Release 6.0

Celerra Security Configuration Guide P/N 300-009-990 REV A01

EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com 2 of 102 Release 6.0 Celerra Security Configuration Guide Contents

Introduction ...... 5 System requirements ...... 5 Cautions and warnings ...... 5 choices ...... 5 Terminology ...... 6 Related information ...... 8 Concepts...... 10 Planning considerations for user identification and authentication ...... 20 Planning considerations for using an external LDAP-based directory server for user identification and authentication ...... 22 Planning considerations for role-based user access ...... 25 Planning considerations for password security ...... 29 Planning considerations for Public Key Infrastructure...... 30 Configuring the use of an external LDAP-based directory server for user identification and authentication ...... 34 Configuring password policy ...... 37 Define password policy interactively ...... 37 Define specific password policy definitions ...... 38 Set password expiration period ...... 38 Configuring session timeout ...... 39 Prerequisites ...... 39 Change the session timeout value ...... 39 Customizing a login banner ...... 41 Creating a message of the day (MOTD) ...... 42 Protecting session tokens ...... 43 Configuring network encryption and authentication using the SSL protocol ...... 44 Using HTTPS ...... 44 Using SSL with LDAP...... 44 Change the default SSL protocol ...... 44 Change the default SSL cipher suite ...... 45 Postrequisites ...... 46 Configuring PKI ...... 47 Creating the certificate provided by the persona ...... 47 Obtaining CA certificates...... 47 Using the Control Station as the CA...... 47 Generate a key set and certificate request...... 48 Send the certificate request to the CA ...... 51 Import a CA-signed certificate...... 52 List the available CA certificates ...... 54 Acquire a CA certificate ...... 54 Import a CA certificate ...... 57 Generate a new Control Station CA certificate ...... 57 Display the certificate...... 58 Distribute the Control Station CA certificate ...... 60 Managing PKI ...... 61 Display key set and certificate properties ...... 61 Check for expired key sets ...... 62 Clear key sets ...... 62

Celerra Security Configuration Guide Release 6.0 3 of 102 Display CA certificate properties ...... 63 Check for expired CA certificates ...... 63 Delete CA certificates...... 64 Troubleshooting...... 65 Where to get help ...... 65 EMC E-Lab Interoperability Navigator ...... 65 Troubleshooting the Control Station connection to a LDAP-based directory server ...... 65 Troubleshooting local user accounts...... 66 Troubleshooting domain-mapped user accounts ...... 68 Troubleshooting certificate imports ...... 68 Error messages...... 70 Training and Professional Services ...... 70 Appendix A: CLI role-based access setup ...... 71 Appendix B: Supported SSL cipher suites ...... 81 Appendix C: Understanding your LDAP-based directory server configuration ...... 83 Active Directory Users & Computers ...... 83 Ldap Admin ...... 90 Index ...... 99

4 of 102 Release 6.0 Celerra Security Configuration Guide Introduction

The EMC® Celerra® Network Server implements a variety of security features to control user and network access, monitor system access and use, and support the transmission of encrypted data. These security features are implemented on the Control Station and Data Movers. This document explains why, when, and how to use these security features. A basic understanding of these features is important to understanding Celerra security. "Concepts" on page 10 provides more details. This document is part of the Celerra Network Server documentation set and is intended for administrators responsible for the overall configuration and operation of the Celerra.

System requirements Table 1 on page 5 describes the Celerra Network Server software, hardware, network, and storage configurations.

Table 1 Security system requirements

Software Celerra Network Server version 6.0

Hardware No specific hardware requirements

Network No specific network requirements

Storage No specific storage requirements

Cautions and warnings If any of this information is unclear, contact your EMC Customer Support Representative for assistance. If you do not change the default passwords during installation, you should change them as soon as possible.

User interface choices The Celerra Network Server offers flexibility in managing networked storage that is based on your support environment and interface preferences. This document describes how to configure security features by using the command line interface (CLI). You can also perform many of these tasks by using the EMC Unisphere™ software. The Unisphere online help contains additional information about managing your Celerra. The Celerra Network Server Release Notes contain additional, late-breaking information about Celerra management applications.

Celerra Security Configuration Guide Release 6.0 5 of 102 Terminology The Celerra Glossary provides a complete list of Celerra terminology. access control entry (ACE): In a Microsoft Windows environment, an element of an access control list (ACL). This element defines access rights to a file for a user or group. access control list (ACL): A list of access control entries (ACEs) that provide information about the users and groups allowed access to an object. access policy: The policy that defines what access control methods (NFS permissions and/or Windows ACLs) are enforced when a user accesses a file on a Celerra system in an environment configured to provide multiprotocol access to some file systems. The access policy is set with the server_mount command and also determines what actions a user can perform against a file or directory. authentication: The process for verifying the identity of a user trying to access a resource or object, such as a file or a directory. Certificate Authority (CA): A trusted third party that digitally signs public key certificates. Certificate Authority Certificate: A digitally signed association between an identity (a Certificate Authority) and a public key to be used by the host to verify digital signatures on Public Key Certificates. command line interface (CLI): An interface for entering commands through the Control Station to perform tasks that include the management and configuration of the database and Data Movers and the monitoring of statistics for the Celerra cabinet components. Common Internet File System (CIFS): A file-sharing protocol based on the Microsoft (SMB). It allows users to share file systems over the Internet and intranets. Control Station: A hardware and software component of the Celerra Network Server that manages the system and provides an administrative user interface to Celerra components. Data Mover: A Celerra Network Server cabinet component running its own that retrieves files from a storage device and makes them available to a network client. digital certificate: An electronic ID issued by a certificate authority that establishes a user’s credentials. It contains the user’s identity (a hostname), a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and a digital signature from the certificate-issuing authority so that a recipient can verify that the certificate is valid. directory server: A server that stores and organizes information about a computer network's users and network resources, and that allows network administrators to manage users' access to the resources. X.500 is the best-known open directory service. Proprietary directory services include Microsoft’s Active Directory. Hypertext Transfer Protocol (HTTP): The communications protocol used to connect to servers on the World Wide Web. Hypertext Transfer Protocol Secure (HTTPS): HTTP over SSL. All network traffic between the client and server system is encrypted. In addition, there is the option to

6 of 102 Release 6.0 Celerra Security Configuration Guide verify server and client identities. Typically server identities are verified and client identities are not. Kerberos: An authentication, data integrity, and data privacy encryption mechanism used to encode authentication information. Kerberos coexists with NTLM (Netlogon services) and, using secret-key cryptography, provides authentication for client/server applications. LDAP-based directory: A directory server that provides access by LDAP. Examples of LDAP-based directory servers include OpenLDAP or iPlanet (also known as Sun Java System Directory Server and Sun ONE Directory Server). Lightweight Directory Access Protocol (LDAP): An industry-standard information access protocol that runs directly over TCP/IP. It is the primary access protocol for Active Directory and LDAP-based directory servers. LDAP Version 3 is defined by a set of Proposed Standard documents in Internet Engineering Task Force (IETF) RFC 2251. (NFS): A distributed file system providing transparent access to remote file systems. NFS allows all network systems to share a single copy of a directory. OpenLDAP: The open source implementation of an LDAP-based directory service. persona: A means of providing an identity for a Data Mover as either a server or a client through a private key and associated public key certificate. Each persona can maintain up to two sets of keys (current and next), to allow for the generation of new keys and certificates prior to the expiration of the current certificate. Public Key Infrastructure (PKI): A means of managing private keys and associated public key certificates for use in Public Key Cryptography. Simple Network Management Protocol (SNMP): Method used to communicate management information between the network management stations and the agents in the network elements. Secure Socket Layer (SSL): A security protocol that provides encryption and authentication. It encrypts data and provides message and server authentication. It also supports client authentication if required by the server. Transport Layer Security (TLS): The successor protocol to SSL for general communication authentication and encryption over TCP/IP networks. TLS version 1 is nearly identical with SSL version 3. X.509: A widely used standard for defining digital certificates. XML API: An interface for remotely managing and monitoring a Celerra Network Server. The interface uses XML formatted messages, and is programming language neutral.

Celerra Security Configuration Guide Release 6.0 7 of 102 Related information Specific information related to the features and functionality described in this document is included in: ◆ Celerra Network Server Command Reference Manual

◆ Online Celerra man pages

◆ Celerra Network Server Parameters Guide

◆ Celerra Glossary

◆ Installing Celerra Management Applications

◆ Configuring and Managing CIFS on Celerra

◆ Configuring NFS on Celerra

◆ Managing Celerra for a Multiprotocol Environment

◆ Configuring Celerra Naming Services

◆ Using Celerra FileMover

◆ Configuring Celerra Events and Notifications

◆ Auditing in the Celerra Control Station Technical Note

◆ Celerra Network Server on the Enterprise Network Technical Note For general information on LDAP, refer to: ◆ RFC 2307, An Approach for Using LDAP as a Network Information Service For specific information on Active Directory’s LDAP and SSL configuration, refer to: ◆ Microsoft Knowledge Base article How to enable LDAP over SSL with a third- party certification authority (ID 321051) For specific information on OpenLDAP and SSL configuration, refer to the OpenLDAP website (www.openldap.org). If you are using a different non-Active Directory LDAP-based directory server, refer to that vendor’s documentation for information on LDAP and SSL configuration. EMC Celerra documentation on Powerlink The complete set of EMC Celerra customer publications is available on the EMC Powerlink® website. To search for technical documentation, go to http://Powerlink.EMC.com. After logging in to Powerlink, click Support, and locate the link for the specific product technical documentation required. Celerra Support Demos Celerra Support Demos are available on Powerlink. Use these instructional videos to learn how to perform a variety of Celerra configuration and management tasks. After logging in to Powerlink, click Support. Then click the link for the specific product required. Click Tools. Locate the link for the video you require.

8 of 102 Release 6.0 Celerra Security Configuration Guide Celerra wizards Celerra wizards can be used to perform set up and configuration tasks. Using Wizards to Configure Celerra provides you with an overview of the steps required to configure a Celerra Network Server using the Set Up Celerra wizard.

Celerra Security Configuration Guide Release 6.0 9 of 102 Concepts

Strong system security features are increasingly necessary to comply with new regulations and ensure greater protection against system attacks. Celerra implements a variety of features on both the Control Station and Data Movers to secure its infrastructure, control access, and protect data. On the Control Station: ◆ To secure its infrastructure, Celerra provides a variety of features that can be used to tighten the operation of the Control Station. Table 2 on page 11 describes these features.

◆ To protect system resources against unauthorized access, Celerra supports strict user identification and authentication, role-based access, and customer- defined password policies. Table 3 on page 13 describes these features.

◆ To support the transmission of encrypted data, Celerra supports the SSL security protocol. Table 4 on page 15 describes this feature. On Data Movers: ◆ To secure its infrastructure, Celerra provides a variety of features that can be used to tighten the operation of the Data Movers. Table 5 on page 16 describes these features.

◆ To protect the transmission of encrypted data, Celerra supports the SSL security protocol and public key certificate management for certain protocols. Table 6 on page 19 describes these features. Although many of these features require explicit configuration and management, others have been introduced as basic changes to software operation. For example, beginning with Celerra version 5.6, the following changes have been implemented: ◆ Security between a user and the Unisphere software and between two Control Stations has been enhanced by changing the checksum used to sign the session token (cookie) from MD5 to SHA1. SHA1 produces a 160-bit hash value unlike MD5, which produces only a 128-bit hash value.

◆ Unnecessary services and dynamic ports have been removed from the Control Station's Linux operating system.

Note: Many of the Celerra’s security features are described elsewhere in the documentation library, as noted in the overview tables. Therefore, this document includes detailed configuration procedures for only a subset of the available security features.

10 of 102 Release 6.0 Celerra Security Configuration Guide

Table 2 Overview of Control Station features to secure infrastructure (page 1 of 2)

Feature What it does Restrictions More information

Session timeout Celerra enforces a session Session timeout is enabled by To manage shell session timeout, timeout for administrative default. use the command /nas/sbin/ sessions accessed from both You must be root to modify nas_config -sessiontimeout. Control Station shells and Control Station properties. "Configuring session timeout" on Unisphere. Sessions time out page 39 describes how to after a specified period of configure this feature. inactivity. To manage Unisphere session timeout, select Settings (UI Sessions tasks) > Manage Idle Timeout. You can find a description of this feature in Unisphere online help.

Login banner and A login banner and message You must be root to modify To configure the banner through message of the day of the day (MOTD) provide a Control Station properties. Unisphere, select System (MOTD) way for an administrator to (System tasks) > Manage communicate with Celerra Control Stations. You can find a users. description of this feature in The same login banner is Unisphere online help. seen from the command line To configure the banner and interface and Unisphere. The MOTD through the CLI, use a text MOTD is seen only from the editor to edit the /etc/issue or command line interface. /etc/motd files. "Customizing a login banner" on page 41 and "Creating a message of the day (MOTD)" on page 42 describe how to configure these features.

Network services In Unisphere, you can list the You must be root to modify To manage network services management current state of some network Control Station properties. through Unisphere, select services (and associated System > Network > Network communications ports and Services. You can find a protocols) on the Control description of this feature in Station. You can enable, Unisphere online help. disable, and monitor these services. To improve Celerra security, you should restrict access to the Celerra by disabling network services that are not used in your environment.

Session tokens (cookies) Celerra uses SHA1 to When you change this value, To manage session tokens generate checksums to existing session tokens (cookies), edit the file protect the session tokens (cookies) are no longer valid /nas/http/conf/secret.txt. (cookies) used to identify and current users of Unisphere "Protecting session tokens" on users after they log in. To will have to log in again. page 43 describes how to enhance security, you can You must be root to modify configure this feature. change the default SHA1 Control Station properties. secret value used to generate the checksums.

Celerra Security Configuration Guide Release 6.0 11 of 102 Table 2 Overview of Control Station features to secure infrastructure (page 2 of 2)

Feature What it does Restrictions More information

Auditing Celerra provides configuration You must be root to modify The Technical Note Auditing in files and commands to Control Station properties. the Celerra Control Station, capture management available on EMC Powerlink, activities initiated from the provides specific information Control Station, specifically about how to implement auditing. access to key system files and end-user data.

12 of 102 Release 6.0 Celerra Security Configuration Guide

Table 3 Overview of Control Station features to control access (page 1 of 2)

Feature What it does Restrictions More information

User identification and Unique user accounts allow Users can be managed only "Planning considerations for user authentication for more secure management through Unisphere. identification and authentication" of the Celerra. User accounts The Linux commands available on page 20 describes the can be either a local user from the CLI (useradd, userdel, concepts behind this feature. account or a local user usermod, groupadd, To create and manage users with account mapped from a LDAP groupmod, and groupdel) do Unisphere, select Settings > or storage domain user not support Celerra role-based User Management. You can find account. user access and should no a description of this feature in LDAP domain-mapped user longer be used to manage user Unisphere online help. accounts require that Celerra and group accounts. "Planning considerations for has access to a LDAP-based You must be root or a user who using an external LDAP-based directory server. This may has root or security operator directory server for user mean configuring access to privileges to create a new user identification and authentication" an Active Directory or a non- account. on page 22 describes how Active Directory server such Celerra interacts with an LDAP- as OpenLDAP or iPlanet. based directory server and Storage domain-mapped user "Configuring the use of an accounts require that the external LDAP-based directory Celerra is joined to the server for user identification and storage domain of its authentication" on page 34 associated EMC ®. describes how to configure this feature.

Role-based user access This feature enables you to You must be root or a user who "Planning considerations for role- assign users privileges that has root or security operator based user access" on page 25 are appropriate to their privileges to assign roles. describes the concepts behind responsibilities. this feature. Consequently, it simplifies the To create and manage role-based Unisphere and CLI interfaces user access with Unisphere, for users by limiting the select Settings > User operations they can perform Management. You can find a while protecting the system description of this feature in and customer data from Unisphere online help. operations by those who should not perform them. A role defines the privileges (read, modify, or full control) you can perform on a particular Celerra object. Celerra offers both predefined and custom roles.

Celerra Security Configuration Guide Release 6.0 13 of 102 Table 3 Overview of Control Station features to control access (page 2 of 2)

Feature What it does Restrictions More information

Password quality policy Strong passwords are an This feature defines password "Planning considerations for important element of a complexity requirements for all password security" on page 29 security strategy. Celerra local users. This feature does describes the elements of a enforces several requirements not apply to domain-mapped password quality policy. to guarantee a password users, whose passwords are To define password quality policy, quality policy. governed by the policies within use the command /nas/sbin/ the domain. nas_config -password. You must be root to define the "Configuring password policy" on password quality policy. page 37 describes how to configure this feature.

14 of 102 Release 6.0 Celerra Security Configuration Guide

Table 4 Overview of Control Station features to protect data

Feature What it does Restrictions More information

SSL (X.509) certificates Unisphere uses SSL In the case of Unisphere, the Installing Celerra Management for Unisphere encryption and authentication Control Station serves as a Applications describes how to to protect the connection limited purpose CA, signing the configure this feature. between the user’s web certificate provided by the The Celerra white paper Using browser and Celerra’s Apache Apache web server. Unisphere in Your Web Browsing web server. Digital If you change Celerra's Environment: Browser and certificates, whose hostname, you have to Security Settings to Improve Your authenticity is verified by a regenerate the Control Experience, available on EMC CA, are used by SSL to Station’s CA and Apache Powerlink, provides information identify and authenticate the certificates. When you about how and why to install the server. generate a new CA certificate, certificates. Starting with 5.6, the Celerra a matching Apache certificate software automatically is also generated. generates the CA certificate If you only change Celerra's and a new Apache certificate domain name or IP address, signed by that CA certificate you can just regenerate the at system installation or Apache web server’s software upgrade if these certificate. certificates do not already Once you regenerate the exist. certificates, any browsers or systems using the previous certificates need to install the new certificates. You must be root to modify Control Station properties.

Network encryption and Celerra supports SSL "Planning considerations for authentication using encryption and authentication using an external LDAP-based LDAP over SSL on the LDAP connection directory server for user between the Control Station identification and authentication" and an LDAP-based directory on page 22 describes how server. Celerra interacts with an LDAP- based directory server, and "Configuring the use of an external LDAP-based directory server for user identification and authentication" on page 34 describes how to configure this feature.

Celerra Security Configuration Guide Release 6.0 15 of 102

Table 5 Overview of Data Mover features to secure infrastructure (page 1 of 3)

Feature What it does Restrictions More information

Network services In Unisphere, you can list the Some services that are running To manage network services management current state of some network on the Data Movers require a through Unisphere, select services (and associated reboot for changes to take System > Network > Network communications ports and effect. Services. You can find a protocols) on the Data Movers. description of this feature in You can enable, disable, and Unisphere online help. monitor these services. To improve Celerra security, you should restrict access to the Celerra by disabling network services that are not used in your environment, for example, FTP.

CIFS Kerberos Since Kerberos is now the The server_cifs man page authentication recommended authentication describes how to configure this method in Windows setting. Configuring and environments, you may want Managing CIFS on Celerra to disable NTLM describes authentication. authentication. (By default, Celerra allows both Kerberos and NTLM authentication.) To set CIFS server authentication mode to Kerberos only, use the command server_cifs -add compname=, domain=, authentication=kerberos.

NFS security settings Although generally regarded All NFS exports are displayed Configuring NFS on Celerra as a vulnerable file-sharing by default. To hide NFS describes how to configure these protocol, you can make NFS exports, you must change the settings. more secure by using the value of the following configuration forceFullShowmount settings: parameter. • Defining read-only access for some (or all) hosts • Limiting root access to specific systems or subnets • Hiding export and mount information if a client does not have mount permissions for the file system corresponding to that entry In addition, if strong authentication is required, you can configure Secure NFS, which uses Kerberos.

16 of 102 Release 6.0 Celerra Security Configuration Guide Table 5 Overview of Data Mover features to secure infrastructure (page 2 of 3)

Feature What it does Restrictions More information

Access policies Celerra’s set of customizable The mixed access policy is Managing Celerra for a access modes allow you to required when using NFSv4. Multiprotocol Environment choose the best possible describes how to configure this interaction between NFS and feature. CIFS access for your environment. You can select how security attributes are maintained and the type of interaction between NFS and CIFS users including: • Separate • CIFS dominant • NFS dominant • Equal • Mixed (used to achieve a high level of synchronization between the two protocols)

Windows-style (NT) Celerra allows you to create a Managing Celerra for a credentials for UNIX common Windows-style (NT) Multiprotocol Environment users credential. Users therefore describes how to configure this have the same credentials feature. regardless of their file access protocol, providing more consistent access control.

SNMP management The SNMP community string SNMP is used for Configuring Celerra Events and provides the basis for security communication between the Notifications describes how to in SNMP. The default Control Station and Data configure this feature. community name is the well- Mover, so disabling it can known name public. This interfere with some functions. name should be changed to For example, the prevent unwanted access to server_netstat command will Celerra. not work. Use the server_snmp -community command to assign a new value to a server SNMP agent’s community for a Data Mover.

Celerra Security Configuration Guide Release 6.0 17 of 102 Table 5 Overview of Data Mover features to secure infrastructure (page 3 of 3)

Feature What it does Restrictions More information

IP packet reflect IP packet reflect provides your Configuring and Managing network with an additional Celerra Networking describes security level. Because reply how to configure this feature. packets always go out the same interface as the request packets, request packets cannot be used to indirectly flood other LANs. In cases where two network devices exist, one connected to the Internet and the other connected to the intranet, replies to Internet requests do not appear on the intranet. Also, the internal networks used by Celerra are not affected by any packet from external networks.

18 of 102 Release 6.0 Celerra Security Configuration Guide

Table 6 Overview of Data Mover features to protect data

Feature What it does Restrictions More information

Network encryption and Celerra supports SSL SSL on Data Mover connec- "Configuring network encryption authentication through encryption and authentication tions can be configured and and authentication using the SSL SSL for both LDAP and HTTP managed only through the CLI. protocol" on page 44 describes connections between Data how to configure parameters Movers and various external associated with this feature. services. Configuring Celerra Naming Ser- vices and Using Celerra FileM- over describe how to configure and manage SSL for these fea- tures.

Public key certificates The PKI framework provides The Celerra PKI framework "Planning considerations for the software management supports only X.509 public key Public Key Infrastructure" on and database systems to certificates. page 30 describes the concepts support the use of digital behind this feature. certificates for Data Mover "Configuring PKI" on page 47 and LDAP and HTTP connections "Managing PKI" on page 61 on which SSL is enabled. describe how to configure and manage this feature by using the CLI. To configure and manage PKI through Unisphere, select Settings > Public Key Certificates. You can find a description of this feature in Unisphere online help.

Celerra Security Configuration Guide Release 6.0 19 of 102 Planning considerations for user identification and authentication Creating unique users, each with privileges appropriate to their responsibilities, simplifies Celerra management by limiting the operations that users can perform as well as by protecting system and customer data from operations by users who should not perform them. The administrators feature enables you to define: ◆ Users who need to view, configure, or manage Celerra file server operation

◆ Groups by which to organize users

◆ Roles to associate with groups

◆ Privilege levels that define the roles for accessing and controlling all Celerra objects For simplified management, the user management feature also provides the ability to use an external LDAP directory server as a centralized repository of user accounts. In addition, user accounts created to manage storage are mapped to Celerra user accounts so that storage domain global users can be given privileges to access and control Celerra objects. The association of specific privileges with users, also referred to as roles, is supported for users who access the Celerra through the CLI, Unisphere, and the XML API.

Note: This feature is different from the existing Control Station access control support managed by using the nas_acl command.

Default users Celerra provides two default user accounts: root and nasadmin. You can create additional users, each with privileges appropriate to their responsibilities. The root user can access and control every object and action in Celerra. The nasadmin user has the same access and control as root with certain exceptions. Table 8 on page 26 lists the Unisphere features root and nasadmin can access and control. Table 14 on page 78 lists the CLI commands that only root or nasadmin or, in some cases, an user account associated with the root and nasadmin roles can execute. "Planning considerations for role-based user access" on page 25 provides more information on how root and nasadmin are affected by role-based access.

Note: The privileges assigned to root and nasadmin cannot be modified and these accounts cannot be disabled or deleted.

Creating new users You can also create additional user accounts, each with privileges appropriate to their responsibilities. Create new user accounts by using Settings > User

20 of 102 Release 6.0 Celerra Security Configuration Guide Management > Users > Create. Unisphere online help provides a detailed explanation of this procedure.

Note: Beginning with version 5.6, you should no longer create user accounts through the CLI. The Linux commands previously used in the CLI to manage user and group accounts (useradd, userdel, usermod, groupadd, groupmod, and groupdel) do not support Celerra role-based access and will no longer set up entries recognized by the Celerra software.

To create a new user account, you must be root or a user who has root or security_operator privileges. "Planning considerations for role-based user access" on page 25 describes how privileges are assigned and used. User accounts can be a local user account, a LDAP domain user account mapped from a LDAP domain account (described in "LDAP domain-mapped user accounts" on page 21), or a storage domain global user account mapped from a storage domain account (described in "Storage domain global user accounts" on page 21).

Note: When logging in to Unisphere with a local user account, select Scope and change the value to Local to indicate you are using a local user account that will be authenticated by and used to manage the Celerra system only.

LDAP domain-mapped user accounts A LDAP domain-mapped user account uses the username and password specified on the LDAP domain server. This type of user account is always authenticated on the LDAP domain server. If the LDAP domain server is not available, the user is not able to log in. Mapping users to local user accounts provides the mechanism for verifying that a user who is authenticated by an external LDAP directory server is authorized to access the Celerra, and that the user has the necessary local credentials, including a UID, to perform tasks. Celerra provides the ability to automatically create local user accounts for LDAP domain users. When enabled, a local user account is established for any LDAP domain-mapped user who can successfully authenticate with the LDAP domain server and who belongs to at least one group mapped to the Celerra system. The LDAP domain user account's local account name will be the same name as the domain username along with the appended domain name (for example, joe.corp). If that name already exists locally, a number will be appended to the username (for example, joe1.corp). The appended number is the next unused number in sequence.

Note: When logging in to Unisphere with a LDAP domain user account, select Use LDAP to indicate the user account will be authenticated by the LDAP domain server. Select local scope to manage the Celerra system only. Select global scope to manage all systems within the storage domain.

Storage domain global user accounts In addition to local user accounts and user accounts mapped from a LDAP domain account, a user account can be a local user account mapped from a storage domain global user account. Beginning with version 6.0, when a Celerra is joined to the storage domain of its associated CLARiiON, the existing storage domain global user account is imported into the Celerra user account database so that the global

Celerra Security Configuration Guide Release 6.0 21 of 102 user account can also be used to manage the Celerra system. A storage domain- mapped user account uses the username and password specified in the storage domain. This type of user account is always authenticated in the storage domain. By default, Unisphere expects that a storage domain user account be used to log in. Logging in using a global user account allows you to manage both Celerra and CLARiiON systems. However, since Celerra initially gives a storage domain- mapped user the operator role (read-only privileges), you must change the role with which it is associated to give it administrator privileges.

Note: Alternatively, you can manage both Celerra and CLARiiON systems by logging in using a LDAP domain user account that is recognized by both systems.

You define roles by using Settings > User Management > Roles > Create. Unisphere online help provides a detailed explanation of this procedure. Specifying user access to the Celerra Users can access the Celerra system through the Control Station shell command line interface (CLI), Unisphere, or XML API.

Note: The XML API allows you to create your own GUI or other types of management interface. Like Unisphere and certain CLI commands, the XML API uses the Celerra software interface between the web user interface presentation layer and the core Control Station code, referred to as the appliance layer or APL. Consequently, access to the Celerra through the XML API must be specifically enabled.

When you create a new user, you must specify the type of access that user has to the Celerra. By default, a new user has no access. When a local user account is created automatically for a domain-mapped user that new user is given access to Unisphere and the XML API by default.

Planning considerations for using an external LDAP-based directory server for user identification and authentication A user account can be identified and authenticated by an external directory server when the user logs in to the Celerra Control Station. The external directory server provides a centralized repository of user accounts, simplifying management. The external directory server can be an LDAP-based Active Directory or non-Active Directory server: ◆ Active Directory is an LDAP-based directory service used in Windows that provides management of user and group accounts, security, and distributed resources.

◆ OpenLDAP and iPlanet (also known as Sun Java System Directory Server and Sun ONE Directory Server) are distributed LDAP-based directory servers that provide a central repository for storing and managing identity profiles, access privileges, and application and network resource information. Understanding the directory server An LDAP-based directory server organizes information in a hierarchical directory structure unique to a particular organization’s needs. Each object stored in the directory is represented by a directory entry. An entry is formed by one or more

22 of 102 Release 6.0 Celerra Security Configuration Guide attributes. Entries are stored in a hierarchical form in the directory tree. Each entry is uniquely defined by its distinguished name (DN) which enumerates the position of this entry in the tree. For example, the distinguished name for the admin group is "cn=admin,ou=group,dc=mycompany,dc=com". Using LDAP, one may query an entry and request all the entries and their attributes below the requested entry. An example of an LDAP-based directory structure is as follows:

dc=mycompany,dc=com

ou=people ou=groupou=hosts ou=netgroup

dc= indicates domain components and ou= indicates organizational units consisting of people, groups, hosts, and netgroups. Typically, the cn attribute is used to indicate the name by which a particular entry is commonly known. The directory structure can be changed. You inform the Data Mover about your organization’s directory structure by uploading a custom client configuration profile or configuration file. For example, your organization’s user information might be stored in a container called users rather than people, and hosts in a container called computers rather than hosts. You can also define several containers for the same object class. Configuring access To configure the Control Station’s LDAP-based client, you must have the following information: ◆ domain name — Indicates the root of the LDAP directory tree, that is, where in the LDAP directory tree to begin a search for information. Also known as the base distinguished name. For example, the base distinguished name for the example LDAP-based directory structure is dc=mycompany,dc=com. Active Directory assumes that the attribute type is dc so the base distinguished name can be expressed as simply mycompany.com.

Note: Celerra supports only a single LDAP domain. It does not support trees or forests. Consequently, references to other domains are not followed.

◆ bind distinguished name — Indicates the identity used to bind to the LDAP service, that is, the user or account permitted to search the LDAP directory within the defined search base. Typically, Active Directory assumes a bind distinguished name format of cn=,cn=users,dc=,dc=.

Note: The Active Directory administrator can create users in other locations within Active Directory, in which case the bind distinguished name path may be different.

Celerra Security Configuration Guide Release 6.0 23 of 102 An OpenLDAP directory server accepts different bind distinguished name formats such as cn=,uid=,ou=people,dc=,dc= or uid=,dc=users,dc=,dc=.

◆ user search path and name attribute — Indicate the directory branch Celerra will search for an instance of the name attribute whose value is the user’s account name. Typically, Active Directory assumes a user search path and name attribute of cn=,cn=users,dc=,dc=.

Note: The Active Directory administrator can create users in other locations within Active Directory, in which case the user search path may be different.

An OpenLDAP directory server accepts different bind distinguished name formats such as uid=,ou=people,dc=,dc= or uid=,dc=users,dc=,dc=.

◆ group search path, name attribute, group class and member — Indicate the directory branch Celerra will search for an instance of the attribute whose value is the user’s group name. The group may be further specified by identifying the class in which the group is stored and the attribute of that class. Active Directory assumes a group search path and name attribute of cn=,cn=users,dc=,dc=. In Active Directory, groups and users are stored in the same hierarchy. The group class is called group and the default attribute value is member.

Note: The Active Directory administrator can create groups in other locations within Active Directory, in which case the group search path may be different.

In other directory servers, the class may be posixGroup, groupOfNames, or groupOfUniqueNames. If the group class value is groupOfUniqueNames, the default attribute value is uniqueMember. If the group class value is groupOfNames, the default attribute value is member. If the group class value is posixGroup, the default attribute value is memberUid. Connecting to the directory server using SSL To protect LDAP traffic and improve client and server application security, the LDAP-based directory server can support and, in some cases, require the use of SSL. SSL provides encryption and authentication capabilities. It encrypts data over the network and provides message and server authentication. It also supports client authentication if required by the server. SSL uses digital certificates, whose authenticity is verified by a CA. The LDAP client, using the underlying SSL client, authenticates the certificate received from the LDAP-based directory server. The CA certificate (for the CA that signed the directory server's certificate) must have been imported into the Control Station for the certificate verification to succeed. In addition, the subject from the server's certificate must contain the hostname or IP address of the server, otherwise the certificate verification fails.

24 of 102 Release 6.0 Celerra Security Configuration Guide Note: The Control Station LDAP-based client implementation does not support SSL-based client authentication.

"Configuring the use of an external LDAP-based directory server for user identification and authentication" on page 34 describes how to configure this feature.

Planning considerations for role-based user access A user account is always associated with a primary group and each group is assigned a role. A role defines the privileges (that is, the operations) the user can perform on a particular Celerra object. Beginning in version 5.6, you must have the appropriate privileges to access and control Celerra objects. Groups and roles A user account is always associated with a primary group. It can also be associated with other groups to a maximum of 17. Like user accounts, groups can be either a local group or a local group mapped to a domain group. Celerra offers both predefined and custom groups. Predefined groups cannot be modified or deleted. Each group is assigned a role. A group can be assigned only one role at a time, although a role can be associated with many groups. If a group is not assigned a role, the group is given the default role of operator, which has read privileges only. Table 7 on page 25 lists the predefined groups and their associated roles.

Table 7 Predefined groups and their associated roles (page 1 of 2)

Group name Associated role

backup backup_operator

fullnas nasadmin

nasadmin operator

network network_admin

opadmin operator

root root

security security_operator

storage storage_admin

imported_administrator imported_administrator

imported_manager imported_manager

imported_monitor imported_monitor

Celerra Security Configuration Guide Release 6.0 25 of 102 Table 7 Predefined groups and their associated roles (page 2 of 2)

Group name Associated role

imported_replication imported_replication

imported_security_admin imported_security_admin

Note: Groups and roles with the prefix imported are mapped from storage domain groups and roles. User accounts created to manage storage are mapped to Celerra user accounts, groups, and roles so that storage users can be given privileges to access and control Celerra objects.

A user can have multiple roles by belonging to multiple groups. In this case, a union of these roles determines what operations the user can perform. You can create new groups by using Settings > User Management > Groups > Create. Roles and privileges A role defines the privileges (operations) a user can perform on a particular Celerra object. There are three levels of privileges: ◆ Read — Allows a user to view objects. By default, all users have read privileges on all objects.

◆ Modify — Allows a user to make changes to an object.

◆ Full control — Allows a user to create and delete objects and make significant changes. By default, all users have full control of the task object. Celerra offers both predefined and custom roles. Predefined roles (also identified as system roles) cannot be modified. Custom roles (also identified as user roles) are roles defined by administrators. The predefined roles (and the Unisphere sections and CLI commands over which those roles have full control privileges) are listed in Table 8 on page 26.

Table 8 Unisphere and CLI full control privileges given to predefined roles (page 1 of 3)

Unisphere sections over Predefined roles Associated CLI commands which role has full control

root All Unisphere sections All commands

Note: To have full control over Control Station properties and Connect Home, you must be logged in as the root user. A user assigned root privileges does not have full control over these objects.

26 of 102 Release 6.0 Celerra Security Configuration Guide Table 8 Unisphere and CLI full control privileges given to predefined roles (page 2 of 3)

Unisphere sections over Predefined roles Associated CLI commands which role has full control

nasadmin All Unisphere sections except: All commands with some System (System tasks) > exceptions. See Table 14 on Manage Control Stations page 78 for a list. System (System tasks) > Setup Celerra Wizard > Control Station setup System (Service tasks) > Manage Connect Home Settings > User Management (users, groups, & roles) Settings > User Management (UI Sessions tasks) > Manage Idle Timeout

security operator Settings > User Management nas_license Settings > Public Key server_certificate Certificates server_kerberos server_security

backup operator Replicas > Checkpoints fs_ckpt Storage > Virtual Tape nas_ckpt_schedule server_mount server_mountpoint server_umount server_vtlu

filemover_application Storage > File Systems cel_fs fs_dhsm fs_group fs_timefinder nas_fs nas_fsck server_http server_mpfsstat

network admin System > Network > Interfaces server_arp System > Network > Devices server_dns server_ftp System > Network > DNS server_ifconfig System > Network > Routes server_ldap System > Network (Network server_nis tasks) > Manage NIS Settings server_rip server_route server_snmp server_snmpd server_sysconfig

Celerra Security Configuration Guide Release 6.0 27 of 102 Table 8 Unisphere and CLI full control privileges given to predefined roles (page 3 of 3)

Unisphere sections over Predefined roles Associated CLI commands which role has full control

storage admin Storage > File Systems cel_fs Storage > Data Migration fs_dhsm fs_group Storage > Storage Pools fs_rdf Storage > Volumes fs_timefinder nas_disk nas_fs nas_fsck nas_pool nas_quotas nas_slice nas_storage nas_volume server_cdms server_devconfig server_http server_mount server_mountpoint server_mpfsstat server_umount

operator n/a Display-type options for all commands (such as, -info, -list, -status, -verify)

sd_name n/a n/a

The ability to select a predefined role or define a custom role that gives a user the necessary privileges to execute a command is not available for all CLI commands. The specific command actions available when Modify or Full Control privileges are selected are listed in "Appendix A: CLI role-based access setup" on page 71. Commands not included in this list can only be performed by the default user accounts root and nasadmin or, in some cases, by a user account associated with the root and nasadmin roles. You define roles using by Settings > User Management > Roles > Create. Default user privileges The user account root has its primary group membership in the root group that is associated with the root role. The user account nasadmin has its primary group membership in the nasadmin group, which is associated with the operator role for read-only access. In addition, it is a member of the fullnas group, which is associated with the nasadmin role for modify and full-control access to almost all Celerra objects. By default, a new user is assigned to the nasadmin group, which means the user has only read privileges.

28 of 102 Release 6.0 Celerra Security Configuration Guide Note: In the role-based user access feature, the nasadmin group is associated with the more restrictive operator role. The broader privileges previously associated with the default nasadmin user account are now accessed through membership in the fullnas group. When upgrading to version 5.6, all users previously associated with the nasadmin group are automatically assigned membership in the fullnas group so they retain modify and full- control access to most Celerra objects.

What happens once roles are assigned A user must have the appropriate privileges to access and control Celerra objects. Using Unisphere If a user uses Unisphere to access the Celerra system and that user is not authorized to perform a certain function that function is dimmed and unavailable. This can occur in menus, buttons, and fields. Using the CLI If a user uses the CLI to access the Celerra system and that user is not authorized to perform a certain function, the Celerra software returns an error message. This error message indicates that the user does not have permission to perform this operation and that the role database has to be modified in order for the user to get permission.

Planning considerations for password security Strong passwords are an important element of a security strategy. Password quality policy To ensure that sufficiently strong passwords are chosen by all local users, you can define a password quality policy that enforces a certain complexity for user-defined passwords. This feature does not apply to domain-mapped users, whose passwords are governed by the policies within the domain. The default Celerra password policy includes the following requirements: ◆ A minimum password length of 8 characters

◆ A maximum of 3 attempts to define a new password of acceptable value before the command fails

◆ A minimum of 3 characters that were not in the previous password

◆ A minimum of one numeral in the new password

Note: There is currently no requirement to use special characters (such as !, @, #, $, %, &, ^, and *) or lowercase and uppercase characters in the password.

Celerra also supports a default password expiration period of 120 days. "Configuring password policy" on page 37 describes how to configure this feature.

Note: Changes made to the password quality policy apply only to password defined after the policy is revised.

Celerra Security Configuration Guide Release 6.0 29 of 102 Changing default passwords Celerra provides two default user accounts: root and nasadmin. Both accounts are assigned the password nasadmin by default. The Celerra software installation procedure allows you to enter a different password, but a new password is not required.

! CAUTION! If you do not change the default passwords during installation, you should change them as soon as possible.

You choose and change passwords through the User Properties dialog box in Unisphere. Unisphere online help provides a detailed explanation of this procedure.

Note: You can access the User Properties page from Settings > User Management > Users or from the User Name field on Control Station Properties.

Root and users with security operator privileges are not required to choose passwords that conform to password policy. Furthermore, when creating a new user account, root and users with security operator privileges can assign any password to that user. However, if the user subsequently changes the password, this password is subject to the current password policy. Once the password policy is set, you will receive an error indicating the password is bad if you attempt to define a password that does not meet the specified requirements.

Planning considerations for Public Key Infrastructure Celerra’s Public Key Infrastructure (PKI) provides the software management and database systems to support the use of digital certificates for Data Mover LDAP and HTTP connections on which SSL is enabled. Certificates, whose authenticity is verified by a Certificate Authority (CA), are used by SSL to identify one or both ends of a connection, providing stronger security between clients and servers.

Note: Celerra’s PKI framework supports the X.509 certificate standard. Certificates are encoded using Distinguished Encoding Rules (DER) and may be further encoded in Privacy Enhanced Mail (PEM) format for ease of distribution through email systems.

Personas Personas are used to provide an identity for a Data Mover when it is acting as a server or a client. When negotiating a secure connection with a client (such as the external policy and migration software used with FileMover), the persona provides a private key and certificate to the Data Mover (which is acting as a server). This certificate provides the means by which the client can identify and authenticate the server. When negotiating a secure connection with a server (such as an external LDAP-based directory server) that is configured to require client authentication, the persona provides the private key and certificate to the Data Mover (which is acting as a client). The certificate provides the means by which the server can identify and authenticate the client.

30 of 102 Release 6.0 Celerra Security Configuration Guide By default, each Data Mover is configured with a single persona named default. To create the certificate that the persona provides to the Data Mover, you first generate the persona’s public/private key set. You must then request a signed certificate from a CA. Certificate requests are generated in Privacy Enhanced Mail (PEM) format only.

Note: Currently, each Data Mover is allowed only one persona. Celerra does not support a mechanism to create additional personas.

If you are using the Celerra’s Control Station as the CA, the Control Station automatically receives the certificate request, generates and signs the certificate, and returns the certificate to the Data Mover. The Control Station can sign certificates for all the Data Movers in the cabinet. It cannot be used to sign certificates for any external hosts. "Using the Control Station as the CA" on page 47 describes the tasks for using a Control Station CA. If you are using an external CA, you must send the certificate request manually. The request to sign the public key is generated with the public/private key set. Display the persona’s properties to verify its content. Obtain a copy of the certificate request and then send the request to the CA through that company’s website or email. When the CA returns a signed certificate, you must import it to the Data Mover. To import the signed certificate, you can either provide a path and import a file, or cut and paste the associated text. A file can be in either Distinguished Encoding Rules (DER) or PEM format. You can cut and paste text only in PEM format. Each persona can be associated with up to two sets of keys and certificates (current and next), to allow generating new keys and certificates before the expiration of the current certificate. When the next certificate (which is already valid) is imported, it and its associated key set immediately become the current key set and certificate. Because the next certificate is typically generated when it is needed, you typically do not see a next certificate associated with a persona. However, a next certificate may be waiting if there is a time difference between the Data Mover and the CA (or the Control Station if it is serving as the CA). For example, a CA might prepare a certificate in advance by assigning it a future start date. Merging companies could set up such a certificate to have it in place for the official merge date. The next certificate becomes the current certificate (and the current key and certificate are deleted) when the certificate becomes valid (per Data Mover time), and one of the following happens: ◆ The persona is queried (by either the CLI or Unisphere).

◆ The persona's key and certificate are requested by a Data Mover function (such as SSL). After a certificate expires, any attempt to use the certificate results in a failure, typically a loss of connection or a failure to reconnect. When a new certificate is available, PKI deletes the old certificate and provides the new certificate when requested. However, if you did not obtain a new certificate before the current certificate expires, the certificate request will fail. PKI will not provide an expired certificate for a persona.

Celerra Security Configuration Guide Release 6.0 31 of 102 There is no automated way to check for expired public key certificates. You must check for expired certificates manually by listing the personas and examining the expiration dates of the associated certificates. You can then take action based on your organization’s business practices. "Creating the certificate provided by the persona" on page 47 outlines the procedure for creating the key set and certificate that are provided by the persona to the Data Movers when the Celerra is configured as a server or client. Certificate Authority (CA) certificates When a Celerra-based client application requires a network connection with a server (such as FileMover’s connection with its secondary storage), the server provides a certificate as part of the negotiation for a secure connection. Celerra confirms the server’s identity by validating the certificate. It does this by verifying the server certificate’s signature with the public key from the CA certificate. Obtaining the required CA certificates is a manual task. Typically, before actual operation, you must identify the appropriate CA. Then you must check the list of CA certificates that are available on the Celerra. If a new CA certificate is required and an external CA is being used, you can obtain the CA certificate from the company’s website or from the person responsible for security. If the CA is local (enterprise- level or inhouse), obtain the CA certificate from the person who manages the CA. To make the CA certificate known to the Celerra, you must import it. You can provide a path and import a file, or cut and paste the text. A file can be in either DER or PEM format. You can cut and paste text only in PEM format. "Obtaining CA certificates" on page 47 outlines the procedure for obtaining the certificate that is used to confirm the identity of a server. Using the Control Station as the CA The Celerra software automatically generates a key set and certificate for the Control Station when the system is installed or upgraded. The Control Station uses this key set and certificate to sign certificate requests from Data Movers. However, before the Control Station can successfully operate as a CA and be recognized by a Data Mover as such, you must complete several configuration tasks: ◆ Distribute the Control Station CA certificate to network clients. In order for a network client to validate a certificate sent by a Data Mover that has been signed by the Control Station, the client needs the public key from the CA certificate to verify the Data Mover certificate’s signature.

◆ Import the CA certificate (with the CA certificates from external CAs). A copy of the Control Station certificate can be obtained only by using the CLI command nas_ca_certificate, as described in "Using the Control Station as the CA" on page 47. If the Control Station key set and certificate are compromised, you can regenerate them. This task can be accomplished only through the CLI command nas_ca_certificate. After regenerating the Control Station key set and certificate, you have to regenerate a new key set and certificate request, and then import the signed certificate for any personas whose certificates are signed by the Control Station.

32 of 102 Release 6.0 Celerra Security Configuration Guide Note: The Control Station continues to generate a separate key set for the SSL-based connection between Celerra’s Apache web server (on behalf of Unisphere) and a user’s web browser. However, the Control Station now uses the CA key set to sign the Apache web server’s certificate, meaning the certificate is no longer self-signed. Installing Celerra Management Applications describes how to manage certificates for Unisphere.

Celerra Security Configuration Guide Release 6.0 33 of 102 Configuring the use of an external LDAP-based directory server for user identification and authentication

The use of an external LDAP-based directory server provides a centralized repository of user accounts, simplifying management. "Planning considerations for using an external LDAP-based directory server for user identification and authentication" on page 22 provides a general description. Prior to user login, you must perform a number of preliminary configuration tasks.

Step Action

1. Determine what LDAP-based directory server the Celerra will communicate with.

Note: Typically, the enterprise in which the Celerra is being used already uses an LDAP- based directory server to store user credentials. In this case, consult with the Active Directory or other LDAP-based directory server administrator to obtain connection information. Otherwise, you will need to study the available Active Directory or other LDAP-based directory server and discover the necessary connection information. There are several tools available to manage LDAP-based directory services. "Appendix C: Understanding your LDAP-based directory server configuration" on page 83 provides information on these tools.

2. Obtain the following information: a. The base distinguished name of the root of the LDAP directory tree, that is, where in the LDAP directory tree Celerra would begin a search for information. The base DN can be expressed as a fully qualified domain name or in X.509 format using the attribute dc=. For example, if the fully qualified domain name is mycompany.com, the base DN is expressed as dc=mycompany,dc=com. b. LDAP-based directory server’s IP address or hostname. c. IP address or hostname of a backup LDAP-based directory server.

34 of 102 Release 6.0 Celerra Security Configuration Guide Step Action

3. Request that the directory server administrator add an user or account name identifying the Celerra in the LDAP-based server’s directory structure. Or, if you have permission to create user and group accounts on the Active Directory or another LDAP-based directory server, add this user or account name yourself. This account should be a restricted user account (such as a Domain Guest account) with read/search privileges for the directory.

Note: There are several tools available to manage LDAP-based directory services. "Appendix C: Understanding your LDAP-based directory server configuration" on page 83 provides information on these tools.

This entry identifies the Celerra as the user or account that will bind to the directory service, that is, the user or account permitted to search the LDAP directory within the defined search base. This entry is also known as the bind distinguished name. For example, when using an Active Directory, the bind distinguished name might be defined as cn=,cn=users,dc=,dc= and, when using an OpenLDAP directory server, uid=,dc=users,dc=,dc= or cn=,uid=,ou=people,dc=,dc=.

4. Verify that the administrative users (and their associated groups) that will be logging in to the Control Station are defined in the LDAP-based directory server and determine the paths Celerra will search for an instance of the name attribute whose value is the user or group name. If the user and group accounts do not already exist, request that the directory server administrator add them. Or, if you have permission to create user and group accounts on the Active Directory or another LDAP-based directory server, add these accounts yourself.

Note: There are several tools available to manage LDAP-based directory services. "Appendix C: Understanding your LDAP-based directory server configuration" on page 83 provides information on these tools.

For example, if users and groups are stored in an organizational unit with the common name users, the search path will be cn=users,dc=,dc=.

5. If the LDAP connection uses SSL, obtain the public certificate from the CA that signs the LDAP-based directory server's SSL server certificate. Celerra uses this CA certificate to verify the certificate received from the LDAP server. The certificate must be in a Base64 encoded format. If the LDAP-based directory server uses an external CA, obtain the CA certificate from the CA company’s website. If the LDAP-based directory server uses an inhouse CA or if certificates are self-signed, obtain the CA certificate from the LDAP-based directory server administrator. If you are not enabling SSL, a CA certificate is not required.

Celerra Security Configuration Guide Release 6.0 35 of 102 Step Action

6. With the information you have discovered, log in to Unisphere and use Settings > User Management (User Management tasks) > Manage LDAP Domain to configure the Control Station so it can access the LDAP-based directory server.

Note: If you select the Enable automatic domain user mapping field on the Manage LDAP Domain dialog box, Celerra automatically creates a local user account mapped to the domain user. Alternatively, you can create a user mapped to a domain user and associate it with a domain-mapped group.

Unisphere online help provides a description of these tasks.

36 of 102 Release 6.0 Celerra Security Configuration Guide Configuring password policy

This feature enables the Celerra root administrator to define password complexity requirements for all local users. "Planning considerations for password security" on page 29 provides a general description.

Note: This feature does not apply to domain-mapped users, whose passwords are governed by the policies within the domain.

Note: You must be root to execute the /nas/sbin/nas_config command.

Define password policy interactively

Action

To initiate a script that prompts for password policy definitions, use this command syntax: # /nas/sbin/nas_config -password

Output

Minimum length for a new password (Between 6 and 15): [8] Number of attempts to allow before failing: [3] Number of new characters (not in the old password): [3] Number of digits that must be in the new password: [1] Number of special characters that must be in a new password: [0] Number of lower case characters that must be in password: [0] Number of upper case characters that must be in password: [0]

Notes

The current value defined for each field is displayed in brackets. The original default values for each field are: • Length: minimum 8 characters, range 6-15 • Attempts: maximum of 3 attempts • New characters: minimum of 3 characters • Digits: minimum of 1 digit • Special, lowercase, and uppercase characters: 0 To change the value for each field, type a new value when prompted.

Celerra Security Configuration Guide Release 6.0 37 of 102 Define specific password policy definitions

Action

To set specific password policy definitions, use this command syntax: # /nas/sbin/nas_config -password [-min <6..15>] [-retries ] [-newchars ] [-digits ] [-spechars ] [-lcase ] [-ucase ] where <6..15> = minimum length of the new password. The default length is 8 characters. The length has to be a value between 6 and 15 characters. = number of attempts a user can make to define an acceptable new password before the command fails. The default value is 3 attempts. = minimum number of characters that must be in the new password that were not included in the old password. The default value is 3 characters. = minimum number of digits that must be included in the new password. The default value is 1 digit. = minimum number of special characters (such as !, @, #, $, %, &, ^, and *) that must be included in the new password. The default value is 0. = minimum number of lowercase characters that must be included in the new password. The default value is 0. = minimum number of uppercase characters that must be included in the new password. The default value is 0. Example: To set the minimum length of a new password to 10 characters, type: # /nas/sbin/nas_config -password -min 10

Output

#

Set password expiration period The /etc/login.defs file contains the parameter used to set password expiration.

Step Action

1. Log in to the CLI with your username and password. You must have root privileges to access the /etc/login.def file.

2. Change the value of the pass_max_days parameter in the /etc/login.def file by using vi or another text editor.

Note: The default expiration period is 120 days.

38 of 102 Release 6.0 Celerra Security Configuration Guide Configuring session timeout

Celerra enforces a session timeout for both Unisphere sessions and Control Station shell sessions: ◆ To manage Unisphere session timeout, select Settings (UI Sessions tasks) > Manage Idle Timeout. You can find more detailed information in Unisphere online help.

◆ You can change the default value of the Control Station session timeout by using the command /nas/sbin/nas_config -sessiontimeout.

Note: You must be root to execute the /nas/sbin/nas_config command.

Prerequisites The Control Station supports three shells: ◆ bash

◆ ksh

◆ tcsh Each shell supports a session timeout feature. The Control Station session timeout option sets the session timeout value across the system, automatically updating the appropriate values in /etc/environment for the bash and ksh shells, and the autologout variable in /etc/csh.cshrc for the tcsh shell. After the value is set, newly created shells are affected (but not any currently running shells).

Note: You can change the session timeout value for individual users by setting the relevant variable in the user’s shell configuration file (for example, ~/.bashrc). Values are not restricted if you edit the configuration file directly.

Change the session timeout value The default session timeout value for Control Station shell sessions is 60 minutes. Inactivity or idle time is defined as the time since a primary shell prompt was displayed and no input has been received. Therefore waiting at a prompt within a command for some indeterminate amount of time is not affected by the session timeout value.

Celerra Security Configuration Guide Release 6.0 39 of 102

Action

To change the session timeout value, use this command syntax: # /nas/sbin/nas_config -sessiontimeout where: = number of minutes for session timeout (in the range 5 through 240) Example: To change the session timeout value to 200 minutes, type: # /nas/sbin/nas_config -sessiontimeout 200

Output

#

Disable session timeout

Action

To disable session timeout, use this command syntax: # /nas/sbin/nas_config -sessiontimeout 0 or # /nas/sbin/nas_config -sessiontimeout off

Output

#

40 of 102 Release 6.0 Celerra Security Configuration Guide Customizing a login banner

The /etc/issue file contains a login banner message or system identification, which appears before the login prompt. A login banner can be used for any informational purpose, but is most often used to warn users about unauthorized or improper use of the system.

Step Action

1. Log in to the CLI with your username and password. You must have root privileges to access the /etc/issue file.

2. Edit the /etc/issue file by using vi or another text editor. EMC suggests you add an extra carriage return at the end of the banner message. Use spaces, tabs, and carriage returns to format the message. In general, you should limit the size of the message to no more than a single screen.

Note: Because the login banner appears with the login prompt, do not include any sensitive information in the banner message.

3. Log in to the CLI or Unisphere to view the login banner and verify your changes.

Note: You can also customize the login banner by using System (System tasks) > Control Station Properties. You must have root privileges to access the Login Banner field.

Celerra Security Configuration Guide Release 6.0 41 of 102 Creating a message of the day (MOTD)

The message of the day file, /etc/motd, is displayed after a user successfully logs in. It can be used for any informational purpose, but it is particularly useful for sending messages that affect all users. The message might contain information about a server upgrade or an alert about an impending system shutdown. By default, this file is empty.

Step Action

1. Log in to the CLI with your username and password. You must have root privileges to access the /etc/motd file.

2. Edit the /etc/motd file by using vi or another text editor. EMC suggests you add an extra carriage return at the end of the banner message. Use spaces, tabs, and carriage returns to format the message. In general, you should limit the size of the message to no more than a single screen.

3. Log in to the CLI to display the MOTD and verify your changes.

42 of 102 Release 6.0 Celerra Security Configuration Guide Protecting session tokens

The connection between a user and Unisphere and between two Celerra systems uses SHA1 to generate checksums to protect the session tokens (cookies) that identify users after they log in. The SHA1 secret value used to generate the checksums is set at random during installation. However, to enhance security, you can change the default SHA1 secret value.

Step Action

1. Log in to the CLI with your username and password. You must have root privileges to access the /nas/http/conf/secret.txt file.

2. Edit the /nas/http/conf/secret.txt file by using vi or another text editor. Replace the default phrase with a new value and save the file. When you change this value, existing session tokens are no longer valid and current users of Unisphere will have to log in again.

Celerra Security Configuration Guide Release 6.0 43 of 102 Configuring network encryption and authentication using the SSL protocol

Secure Socket Layer (SSL) is a session level protocol used to encrypt network transmissions on the Internet. It encrypts data and provides message and server authentication. It also supports client authentication if required by the server. SSL is independent of higher level protocols so it can encapsulate any of the application level protocols such as HTTP and LDAP: ◆ Hypertext Transfer Protocol (HTTP) is a fast, stateless, and object-oriented protocol used on the web. It enables web clients and servers to negotiate and interact. Unfortunately it has minimal security features. HTTPS (Secure) is a variant of HTTP used by a server that is SSL-enabled.

◆ Lightweight Directory Access Protocol (LDAP) is an industry-standard access protocol that runs directly over TCP/IP. It is the primary access protocol for Active Directory and other directory servers such as the Sun Java System Directory Server (iPlanet) and OpenLDAP. Celerra supports SSL for Data Mover HTTP and LDAP connections.

Using HTTPS You enable SSL on Data Mover HTTP connections through the server_http command. Currently, Celerra’s FileMover feature uses HTTPS and SSL’s encryption and authentication features. Using Celerra FileMover describes how to configure SSL with HTTP for use by FileMover. The keys and certificates used with SSL are managed by using PKI. PKI is available through the CLI and Unisphere. "Planning considerations for Public Key Infrastructure" on page 30 provides an overview of the PKI feature. "Configuring PKI" on page 47 and "Managing PKI" on page 61 describe how to configure and manage PKI through the CLI.

Using SSL with LDAP You enable SSL on Data Mover LDAP connections through the server_ldap command. Currently, Celerra’s naming service support for OpenLDAP, iPlanet, and Active Directory uses LDAP and SSL’s encryption and authentication features. Configuring Celerra Naming Services describes how to configure SSL with LDAP for use by the OpenLDAP and iPlanet LDAP-based directory servers. The keys and certificates used with SSL are managed through PKI. PKI is available through the CLI and Unisphere. "Planning considerations for Public Key Infrastructure" on page 30 provides an overview of the PKI feature. "Configuring PKI" on page 47 and "Managing PKI" on page 61 describe how to configure and manage PKI through the CLI.

Change the default SSL protocol Celerra supports the following SSL protocol versions: ◆ SSLv3

◆ TLSv1

44 of 102 Release 6.0 Celerra Security Configuration Guide

Action

To change the default SSL protocol, use this command syntax: $ server_param -facility ssl -modify protocol -value where: = name of the Data Mover = 0 (both SSLv3 and TLSv1), 1 (only SSLv3), or 2 (only TLSv1)

Note: The default value is 0.

Parameter and facility names are case-sensitive. Examples: To change the default SSL protocol to SSLv3 only, type: $ server_param server_2 -facility ssl -modify protocol -value 1 To change the default SSL protocol to TLSv1 only, type: $ server_param server_2 -facility ssl -modify protocol -value 2

Output

server_2 : done

Change the default SSL cipher suite A cipher suite defines a set of technologies to secure your SSL communications: ◆ Key exchange algorithm (how the secret key used to encrypt the data is communicated from the client to the server). Examples: RSA key or Diffie- Hellman (DH)

◆ Authentication method (how hosts can authenticate the identity of remote hosts). Examples: RSA certificate, DSS certificate, or no authentication

◆ Encryption cipher (how to encrypt data). Examples: AES (256 or 128 bits), RC4 (128 bits or 56 bits), 3DES (168 bits), DES (56 or 40 bits), or null encryption

◆ Hash algorithm (ensuring data by providing a way to determine if data has been modified). Examples: SHA-1 or MD5 The supported cipher suites combine all these items. "Appendix B: Supported SSL cipher suites" on page 81 lists the SSL cipher suites supported by Celerra.

Celerra Security Configuration Guide Release 6.0 45 of 102

Action

To change the default SSL cipher suite, use this command syntax: $ server_param -facility ssl -modify cipher -value where: = name of the Data Mover. = string that specifies the new cipher value. If the value includes any special characters (such as a semi-colon, space character, or exclamation), it must be enclosed in quotation marks.

Note: The default cipher suite value is ALL:!ADH:!SSLv2:@STRENGTH, which means that Celerra supports all ciphers except the SSLv2, Anonymous Diffie-Hellman, and NULL ciphers, sorted by their “strength”, that is, the size of the encryption key.

Parameter and facility names are case-sensitive. Example: To change the default SSL cipher suite to a strong cipher (mainly AES128 and AES256) to be used by each new SSL connection, type: $ server_param server_2 -facility ssl -modify cipher -value ‘HIGH:@STRENGTH’

Output

server_2 : done

Postrequisites After changing SSL parameter values, you must reboot the Data Mover for a SSL protocol and cipher suite change to take effect.

46 of 102 Release 6.0 Celerra Security Configuration Guide Configuring PKI

"Planning considerations for Public Key Infrastructure" on page 30 provides a general description of this feature.

Creating the certificate provided by the persona The procedure for creating the certificate provided by the persona to the Data Mover varies slightly depending on whether the Certificate Authority (CA) that signs the certificate is an external CA or the Celerra’s Control Station: 1. "Generate a key set and certificate request" on page 48 2. "Send the certificate request to the CA" on page 51 (not required if using the Control Station) 3. "Import a CA-signed certificate" on page 52 (not required if using the Control Station)

Obtaining CA certificates The procedure for obtaining the CA certificates used to confirm the identity of a server includes the following tasks: 1. "List the available CA certificates" on page 54 2. "Acquire a CA certificate" on page 54 3. "Import a CA certificate" on page 57

Using the Control Station as the CA The procedure for using the Control Station as the CA includes the following tasks: 1. "Generate a new Control Station CA certificate" on page 57 2. "Display the certificate" on page 58 3. "Distribute the Control Station CA certificate" on page 60

Note: The Control Station continues to generate a separate key set for the SSL-based connection between Celerra’s Apache web server (on behalf of Unisphere) and a user’s web browser. However, the Control Station now uses the CA key set to sign the Apache web server’s certificate, meaning the certificate is no longer self-signed. Installing Celerra Management Applications describes how to manage certificates for Unisphere.

Celerra Security Configuration Guide Release 6.0 47 of 102 Generate a key set and certificate request To create the certificate provided by the persona to the Data Mover, you first generate the persona’s public/private key set with a request for a CA to sign the certificate. The CA can be an external CA or the Control Station. Create a certificate signed by an external CA

Action

To generate a key set and request for a certificate to be signed by an external CA, use this command syntax: $ server_certificate -persona -generate { | id=} -key_size {-cn | -common_name} where: = name of the physical Data Mover with which the persona is associated. = name of the persona. = ID of the persona. The ID is generated when the persona is created. You can determine the ID through the -persona -list command. = key size, either 2048 or 4096 bits. = commonly used name, typically a hostname that describes the Data Mover with which the persona is associated. If the name includes any special characters (such as a semi- colon, space character, or exclamation), it must be enclosed in quotation marks.

Note: Certificate requests are generated in PEM format only.

Example: To generate a key set and request for a certificate to be signed by an external CA, type: $ server_certificate server_2 -persona -generate default -key_size 4096 -cn ‘name;1.2.3.4’

Output

server_2 : Starting key generation. This could take a long time ... done

48 of 102 Release 6.0 Celerra Security Configuration Guide Create a certificate signed by the Control Station If you are using the Celerra’s Control Station to sign the certificate, you must specify the number of months the certificate is valid.

Action

To generate a key set and request for a certificate to be signed by the Control Station, use this command syntax: $ server_certificate -persona -generate { | id=} -key_size -cs_sign_duration <# of months> {-cn | -common_name} where: = name of the physical Data Mover with which the persona is associated. = name of the persona. = ID of the persona. The ID is generated when the persona is created. You can determine the ID through the -persona -list command. = key size, either 2048 or 4096 bits. <# of months> = number of months the certificate is valid. = commonly used name, typically a hostname that describes the Data Mover with which the persona is associated. If the name includes any special characters (such as a semi- colon, space character, or exclamation), it must be enclosed in quotation marks.

Note: Certificate requests are generated in PEM format only.

Example: To generate a key set and request for a certificate to be signed by the Control Station, type: $ server_certificate server_2 -persona -generate default -key_size 4096 -cs_sign_duration 13 -cn ‘name;1.2.3.4’

Output

server_2 : Starting key generation. This could take a long time ... done

Create a certificate specifying detailed information about the persona When you generate the persona’s public/private key set and certificate request, you can specify detailed information about the Data Mover. Typically this information includes details such as the organization that uses the Data Mover and where it is

Celerra Security Configuration Guide Release 6.0 49 of 102 located. In addition, you have the option of saving the certificate request to a specific file.

Action

To generate a key set and request for a certificate signed by an external CA, specifying detailed information about the Data Mover and saving the certificate request to a specific file, use this command syntax: $ server_certificate -persona -generate { | id=} -key_size {-cn | -common_name} -ou -organization -location -state -country -filename where: = name of the physical Data Mover with which the persona is associated. = name of the persona. = ID of the persona. The ID is generated when the persona is created. You can determine the ID through the -persona -list command. = key size, either 2048 or 4096 bits. = commonly used name, typically a hostname that describes the Data Mover with which the persona is associated. If the name includes any special characters (such as a semi- colon, space character, or exclamation), it must be enclosed in quotation marks. = name of the organizational unit. If the name includes any special characters (such as a semi-colon, space character, or exclamation), it must be enclosed in quotation marks. = name of the organization. = physical location of the organization. = state where the organization is located. = country where the organization is located. = name and path where the generated request are written.

Note: The -ou, -organization, -location, -state, and -country arguments are optional.

Note: The -filename argument is only valid if the certificate will be signed by an external CA.

Note: Certificate requests are generated in PEM format only.

Example: To generate a key set and request for a certificate signed by an external CA, specifying detailed information about the Data Mover and saving the certificate request to a specific file, type: $ server_certificate server_2 -persona -generate default -key_size 4096 -cn ‘name;1.2.3.4’ -ou ‘my.org;my dept’ -organization EMC -location Hopkinton -state MA -country US -filename /tmp/server_2.1.request.pem

Output

server_2 : Starting key generation. This could take a long time ... done

50 of 102 Release 6.0 Celerra Security Configuration Guide Send the certificate request to the CA

Note: This task is not required if you are using the Control Station to sign the certificate. The Control Station automatically receives the certificate request.

If you are using an external CA to sign the certificate, a request to sign the public key is automatically generated along with the public/private key set. You must then send the certificate request to the CA.

Step Action

1. Display the persona’s properties to verify the content of the certificate request by using this command syntax: $ server_certificate -persona -info {-all | | id=} where: = name of the physical Data Mover with which the persona is associated. = name of the persona. = ID of the persona. The ID is generated when the persona is created. Example: To display the properties for the default persona, including the certificate request, type: $ server_certificate server_2 -persona -info default Output: server_2 : id=1 name=default next state=Request Pending next certificate: request subject = CN=name;CN=1.2.3.4 request: -----BEGIN CERTIFICATE REQUEST----- MIIB6TCCAVICAQYwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNMDAxMDE2MjIzMTAzWhcNMDMwMTE0 MjIzMTAzWjBjMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxIzAhBgNVBAMTGlNlcnZlciB0ZXN0IGNl cnQgKDUxMiBiaXQpMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAJ+zw4Qnlf8SMVIP Fe9GEcStgOY2Ww/dgNdhjeD8ckUJNP5VZkVDTGiXav6ooKXfX3j/7tdkuD8Ey2// Kv7+ue0CAwEAATANBgkqhkiG9w0BAQQFAAOBgQCT0grFQeZaqYb5EYfk20XixZV4 GmyAbXMftG1Eo7qGiMhYzRwGNWxEYojf5PZkYZXvSqZ/ZXHXa4g59jK/rJNnaVGM k+xIX8mxQvlV0n5O9PIha5BX5teZnkHKgL8aKKLKW1BK7YTngsfSzzaeame5iKfz itAE+OjGF+PFKbwX8Q== -----END CERTIFICATE REQUEST-----

2. If you have not already done so, save the certificate request to a file (for example, server_2.1.request.pem).

3. Send the.pem file to the CA using that company’s website or email.

Celerra Security Configuration Guide Release 6.0 51 of 102 Import a CA-signed certificate

Note: This task is not required if you are using the Control Station to sign the certificate. The Control Station automatically returns the signed certificate to the Data Mover.

You can import a signed certificate when the next signed certificate associated with the persona is available for download. As soon as the certificate is imported, it becomes the current certificate (assuming that the date is valid).

Step Action

1. Obtain the signed certificate (for example, cert.pem) from the CA.

2. Query all Data Movers to determine which personas are waiting for a signed certificate: $ server_certificate ALL -persona -list Output: server_2 : id=1 name=default next state=Request Pending request subject = CN=name;CN=1.2.3.4 server_3 : id=1 name=default next state=Request Pending request subject = CN=test;CN=5.6.7.8

3. To determine to which persona to import the certificate, match the certificate’s subject with the value of the Request Subject field for those personas whose Next State is Request Pending.

4. Import the signed certificate to the waiting persona by using this command syntax: $ server_certificate -persona -import { | id=} where: = name of the physical Data Mover with which the persona is associated. = name of the persona. = ID of the persona. The ID is generated when the persona is created.

Note: The signed certificate can be in either DER or PEM format. You can only paste text in PEM format at the command prompt. If you specify -filename and provide a path, you can import a CA-signed certificate in either DER or PEM format.

Example: To import the signed certificate, type: $ server_certificate server_2 -persona -import default Output: server_2 : Please paste certificate data. Enter a carriage return and on the new line type ‘end of file’ or ‘eof’ followed by another carriage return.

Note: After the certificate text is pasted correctly, the system prompt is displayed.

52 of 102 Release 6.0 Celerra Security Configuration Guide Step Action

5. Verify that the certificate has been imported successfully by using this command syntax: $ server_certificate -persona -info {-all | | id=} where: = name of the physical Data Mover with which the persona is associated. = name of the persona. = ID of the persona. The ID is generated when the persona is created. Example: To verify that the certificate for the default persona has been imported successfully, type: $ server_certificate server_2 -persona -info default Output: server_2 id=1 name=default next state=Not Available Current Certificate: id = 1 subject = CN=name;CN=1.2.3.4 issuer = O=Celerra Certificate Authority;CN=eng173100 start date = 20070606183824Z end date = 20070706183824Z serial number = 05 signature alg. = sha1WithRSAEncryption public key alg. = rsaEncryption public key size = 4096 version = 3

Note: Typically, after a certificate is imported, it immediately becomes the current key set and certificate, and the Next State field is shown as Not Available. If the imported certificate is not valid (for example, its time stamp is several minutes or more ahead of the Data Mover), the imported key set and certificate remain the next key set and certificate, and the Next State field is shown as Available until such time as the key set and certificate become valid.

Celerra Security Configuration Guide Release 6.0 53 of 102 List the available CA certificates

Action

To display all the available CA certificates, type: $ server_certificate ALL -ca_certificate -list

Output

server_2 : id=1 subject=C=ZA;ST=Western Cape;L=Cape Town;O=Thawte Consulting cc;OU=Certific issuer=C=ZA;ST=Western Cape;L=Cape Town;O=Thawte Consulting cc;OU=Certifica expire=20201231235959Z

id=2 subject=C=US;O=America Online Inc.;CN=America Online Root Certification Aut issuer=C=US;O=America Online Inc.;CN=America Online Root Certification Auth expire=20371119204300Z

id=3 subject=C=US;ST=Massachusetts;L=Westboro;O=EMC;OU=IS;OU=Terms of use at www issuer=O=VeriSign Trust Network;OU=VeriSign, Inc.;OU=VeriSign International expire=20080620235959Z

id=4 subject=C=US;O=VeriSign,Inc.;OU=Class 3 Public Primary Certification Author issuer=C=US;O=VeriSign, Inc.;OU=Class 3 Public Primary Certification Author expire=20280801235959Z

Acquire a CA certificate If a new CA certificate is required and an external CA is being used, you can obtain the CA certificate from the company’s website or possibly from the person in your company responsible for security. If the CA is the Control Station (enterprise-level or inhouse), you can obtain the CA certificate from the person who manages the CA. Alternatively, you can display the text of the CA certificate through the nas_ca_certificate -display command.

Action

To display the Control Station’s CA certificate, type: $ /nas/sbin/nas_ca_certificate -display

Note: The certificate text is displayed on the terminal screen. Alternatively, you can redirect it to a file. The certificate text is enclosed by BEGIN CERTIFICATE and END CERTIFICATE.

54 of 102 Release 6.0 Celerra Security Configuration Guide Output

Certificate: Data: Version: 3 (0x2) Serial Number: 3 (0x3) Signature Algorithm: sha1WithRSAEncryption Issuer: O=Celerra Certificate Authority, CN=eng173100 Validity Not Before: Mar 23 21:07:40 2007 GMT Not After : Mar 21 21:07:40 2012 GMT Subject: O=Celerra Certificate Authority, CN=eng173100 Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): 00:da:b2:37:86:05:a3:73:d5:9a:04:ba:db:05:97: d2:12:fe:1a:79:06:19:eb:c7:2c:c2:51:93:7f:7a: 93:59:37:63:1e:53:b3:8d:d2:7f:f0:e3:49:42:22: f4:26:9b:b4:e4:a6:40:6d:8d:e7:ea:07:8e:ca:b7: 7e:88:71:9d:11:27:5a:e3:57:16:03:a7:ee:19:25: 07:d9:42:17:b4:eb:e6:97:61:13:54:62:03:ec:93: b7:e6:f1:7f:21:f0:71:2d:c4:8a:8f:20:d1:ab:5a: 6a:6c:f1:f6:2f:26:8c:39:32:93:93:67:bb:03:a7: 22:29:00:11:e0:a1:12:4b:02:79:fb:0f:fc:54:90: 30:65:cd:ea:e6:84:cc:91:fe:21:9c:c1:91:f3:17: 1e:44:7b:6f:23:e9:17:63:88:92:ea:80:a5:ca:38: 9a:b3:f8:08:cb:32:16:56:8b:c4:f7:54:ef:75:db: 36:7e:cf:ef:75:44:11:69:bf:7c:06:97:d1:87:ff: 5f:22:b5:ad:c3:94:a5:f8:a7:69:21:60:5a:04:5e: 00:15:04:77:47:03:ec:c5:7a:a2:bf:32:0e:4d:d8: dc:44:fa:26:39:16:84:a7:1f:11:ef:a3:37:39:a6: 35:b1:e9:a8:aa:a8:4a:72:8a:b8:c4:bf:04:70:12: b3:31 Exponent: 65537 (0x10001)

Celerra Security Configuration Guide Release 6.0 55 of 102 Output

X509v3 extensions: X509v3 Subject Key Identifier: 35:06:F2:FE:CC:21:4B:92:DA:74:C9:47:CE:BB:37:21:5E:04:E2:E6 X509v3 Authority Key Identifier: keyid:35:06:F2:FE:CC:21:4B:92:DA:74:C9:47:CE:BB:37:21:5E:04:E2:E6 DirName:/O=Celerra Certificate Authority/CN=eng173100 serial:00 X509v3 Basic Constraints: CA:TRUE X509v3 Subject Alternative Name: DNS:eng173100 Signature Algorithm: sha1WithRSAEncryption 09:c3:13:26:16:be:44:56:82:5d:0e:63:07:19:28:f3:6a:c4: f3:bf:93:25:85:c3:55:48:4e:07:84:1d:ea:18:cf:8b:b8:2d: 54:13:25:2f:c9:75:c1:28:39:88:91:04:df:47:2c:c0:8f:a4: ba:a6:cd:aa:59:8a:33:7d:55:29:aa:23:59:ab:be:1d:57:f6: 20:e7:2b:68:98:f2:5d:ed:58:31:d5:62:85:5d:6a:3f:6d:2b: 2d:f3:41:be:97:3f:cf:05:8b:7e:f5:d7:e8:7c:66:b2:ea:ed: 58:d4:f0:1c:91:d8:80:af:3c:ff:14:b6:e7:51:73:bb:64:84: 26:95:67:c6:60:32:67:c1:f7:66:f4:79:b5:5d:32:33:3c:00: 8c:75:7d:02:06:d3:1a:4e:18:0b:86:78:24:37:18:20:31:61: 59:dd:78:1f:88:f8:38:a0:f4:25:2e:c8:85:4f:ce:8a:88:f4: 4f:12:7e:ee:84:52:b4:91:fe:ff:07:6c:32:ca:41:d0:a6:c0: 9d:8f:cc:e8:74:ee:ab:f3:a5:b9:ad:bb:d7:79:67:89:34:52: b4:6b:39:db:83:27:43:84:c3:c3:ca:cd:b2:0c:1d:f5:20:de: 7a:dc:f0:1f:fc:70:5b:71:bf:e3:14:31:4c:7e:eb:b5:11:9c: 96:bf:fe:6f -----BEGIN CERTIFICATE----- MIIDoDCCAoigAwIBAgIBAzANBgkqhkiG9w0BAQUFADA8MSYwJAYDVQQKEx1DZWxl cnJhIENlcnRpZmljYXRlIEF1dGhvcml0eTESMBAGA1UEAxMJZW5nMTczMTAwMB4X DTA3MDMyMzIxMDc0MFoXDTEyMDMyMTIxMDc0MFowPDEmMCQGA1UEChMdQ2VsZXJy YSBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxEjAQBgNVBAMTCWVuZzE3MzEwMDCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANqyN4YFo3PVmgS62wWX0hL+GnkG GevHLMJRk396k1k3Yx5Ts43Sf/DjSUIi9CabtOSmQG2N5+oHjsq3fohxnREnWuNX FgOn7hklB9lCF7Tr5pdhE1RiA+yTt+bxfyHwcS3Eio8g0ataamzx9i8mjDkyk5Nn uwOnIikAEeChEksCefsP/FSQMGXN6uaEzJH+IZzBkfMXHkR7byPpF2OIkuqApco4 mrP4CMsyFlaLxPdU73XbNn7P73VEEWm/fAaX0Yf/XyK1rcOUpfinaSFgWgReABUE d0cD7MV6or8yDk3Y3ET6JjkWhKcfEe+jNzmmNbHpqKqoSnKKuMS/BHASszECAwEA AaOBrDCBqTAdBgNVHQ4EFgQUNQby/swhS5LadMlHzrs3IV4E4uYwZAYDVR0jBF0w W4AUNQby/swhS5LadMlHzrs3IV4E4uahQKQ+MDwxJjAkBgNVBAoTHUNlbGVycmEg Q2VydGlmaWNhdGUgQXV0aG9yaXR5MRIwEAYDVQQDEwllbmcxNzMxMDCCAQAwDAYD VR0TBAUwAwEB/zAUBgNVHREEDTALggllbmcxNzMxMDAwDQYJKoZIhvcNAQEFBQAD ggEBAAnDEyYWvkRWgl0OYwcZKPNqxPO/kyWFw1VITgeEHeoYz4u4LVQTJS/JdcEo OYiRBN9HLMCPpLqmzapZijN9VSmqI1mrvh1X9iDnK2iY8l3tWDHVYoVdaj9tKy3z Qb6XP88Fi3711+h8ZrLq7VjU8ByR2ICvPP8UtudRc7tkhCaVZ8ZgMmfB92b0ebVd MjM8AIx1fQIG0xpOGAuGeCQ3GCAxYVndeB+I+Dig9CUuyIVPzoqI9E8Sfu6EUrSR /v8HbDLKQdCmwJ2PzOh07qvzpbmtu9d5Z4k0UrRrOduDJ0OEw8PKzbIMHfUg3nrc 8B/8cFtxv+MUMUx+67URnJa//m8= -----END CERTIFICATE-----

56 of 102 Release 6.0 Celerra Security Configuration Guide Import a CA certificate To make the CA certificate known to the Data Movers, you must import it. You can provide a path and import a file or cut and paste the text.

Action

To import a CA certificate, use this command syntax: $ server_certificate -ca_certificate -import [-filename ] where: = name of the physical Data Mover with which the CA certificate is associated = location of the file to be imported

Note: The CA certificate can be in either DER or PEM format. You can only paste text in PEM format at the command prompt. If you specify -filename and provide a path, you can import a CA certificate in either DER or PEM format.

Example: To import a CA certificate, type: $ server_certificate server_2 -ca_certificate -import

Output

server_2 : Please paste certificate data. Enter a carriage return and on the new line type ‘end of file’ or ‘eof’ followed by another carriage return.

Note

After the certificate text is pasted correctly, the system prompt is displayed.

Generate a new Control Station CA certificate

Note: This task is required only if the CA key set has been compromised or the CA certificate expires. The initial Control Station CA certificate is generated during a Celerra software 5.6 installation or upgrade.

You must be the root user to issue this command.

Action

To generate a new key set and certificate for the Control Station, type: # /nas/sbin/nas_ca_certificate -generate

Note: By default, this certificate is valid for 5 years from the date it is generated and the certificate’s name is the Control Station’s hostname.

Celerra Security Configuration Guide Release 6.0 57 of 102 Output

New keys and certificate were successfully generated.

Display the certificate Display the text of the Control Station CA certificate so you can copy it for distribution to network clients.

Action

To display the Control Station’s CA certificate, type: $ /nas/sbin/nas_ca_certificate -display

Note: The certificate text is displayed on the terminal screen. Alternatively, you can redirect it to a file.

Output

Certificate: Data: Version: 3 (0x2) Serial Number: 3 (0x3) Signature Algorithm: sha1WithRSAEncryption Issuer: O=Celerra Certificate Authority, CN=eng173100 Validity Not Before: Mar 23 21:07:40 2007 GMT Not After : Mar 21 21:07:40 2012 GMT Subject: O=Celerra Certificate Authority, CN=eng173100 Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): 00:da:b2:37:86:05:a3:73:d5:9a:04:ba:db:05:97: d2:12:fe:1a:79:06:19:eb:c7:2c:c2:51:93:7f:7a: 93:59:37:63:1e:53:b3:8d:d2:7f:f0:e3:49:42:22: f4:26:9b:b4:e4:a6:40:6d:8d:e7:ea:07:8e:ca:b7: 7e:88:71:9d:11:27:5a:e3:57:16:03:a7:ee:19:25: 07:d9:42:17:b4:eb:e6:97:61:13:54:62:03:ec:93: b7:e6:f1:7f:21:f0:71:2d:c4:8a:8f:20:d1:ab:5a: 6a:6c:f1:f6:2f:26:8c:39:32:93:93:67:bb:03:a7: 22:29:00:11:e0:a1:12:4b:02:79:fb:0f:fc:54:90: 30:65:cd:ea:e6:84:cc:91:fe:21:9c:c1:91:f3:17: 1e:44:7b:6f:23:e9:17:63:88:92:ea:80:a5:ca:38: 9a:b3:f8:08:cb:32:16:56:8b:c4:f7:54:ef:75:db: 36:7e:cf:ef:75:44:11:69:bf:7c:06:97:d1:87:ff: 5f:22:b5:ad:c3:94:a5:f8:a7:69:21:60:5a:04:5e: 00:15:04:77:47:03:ec:c5:7a:a2:bf:32:0e:4d:d8: dc:44:fa:26:39:16:84:a7:1f:11:ef:a3:37:39:a6: 35:b1:e9:a8:aa:a8:4a:72:8a:b8:c4:bf:04:70:12: b3:31 Exponent: 65537 (0x10001)

58 of 102 Release 6.0 Celerra Security Configuration Guide Output

X509v3 extensions: X509v3 Subject Key Identifier: 35:06:F2:FE:CC:21:4B:92:DA:74:C9:47:CE:BB:37:21:5E:04:E2:E6 X509v3 Authority Key Identifier: keyid:35:06:F2:FE:CC:21:4B:92:DA:74:C9:47:CE:BB:37:21:5E:04:E2:E6 DirName:/O=Celerra Certificate Authority/CN=eng173100 serial:00 X509v3 Basic Constraints: CA:TRUE X509v3 Subject Alternative Name: DNS:eng173100 Signature Algorithm: sha1WithRSAEncryption 09:c3:13:26:16:be:44:56:82:5d:0e:63:07:19:28:f3:6a:c4: f3:bf:93:25:85:c3:55:48:4e:07:84:1d:ea:18:cf:8b:b8:2d: 54:13:25:2f:c9:75:c1:28:39:88:91:04:df:47:2c:c0:8f:a4: ba:a6:cd:aa:59:8a:33:7d:55:29:aa:23:59:ab:be:1d:57:f6: 20:e7:2b:68:98:f2:5d:ed:58:31:d5:62:85:5d:6a:3f:6d:2b: 2d:f3:41:be:97:3f:cf:05:8b:7e:f5:d7:e8:7c:66:b2:ea:ed: 58:d4:f0:1c:91:d8:80:af:3c:ff:14:b6:e7:51:73:bb:64:84: 26:95:67:c6:60:32:67:c1:f7:66:f4:79:b5:5d:32:33:3c:00: 8c:75:7d:02:06:d3:1a:4e:18:0b:86:78:24:37:18:20:31:61: 59:dd:78:1f:88:f8:38:a0:f4:25:2e:c8:85:4f:ce:8a:88:f4: 4f:12:7e:ee:84:52:b4:91:fe:ff:07:6c:32:ca:41:d0:a6:c0: 9d:8f:cc:e8:74:ee:ab:f3:a5:b9:ad:bb:d7:79:67:89:34:52: b4:6b:39:db:83:27:43:84:c3:c3:ca:cd:b2:0c:1d:f5:20:de: 7a:dc:f0:1f:fc:70:5b:71:bf:e3:14:31:4c:7e:eb:b5:11:9c: 96:bf:fe:6f -----BEGIN CERTIFICATE----- MIIDoDCCAoigAwIBAgIBAzANBgkqhkiG9w0BAQUFADA8MSYwJAYDVQQKEx1DZWxl cnJhIENlcnRpZmljYXRlIEF1dGhvcml0eTESMBAGA1UEAxMJZW5nMTczMTAwMB4X DTA3MDMyMzIxMDc0MFoXDTEyMDMyMTIxMDc0MFowPDEmMCQGA1UEChMdQ2VsZXJy YSBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxEjAQBgNVBAMTCWVuZzE3MzEwMDCCASIw DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANqyN4YFo3PVmgS62wWX0hL+GnkG GevHLMJRk396k1k3Yx5Ts43Sf/DjSUIi9CabtOSmQG2N5+oHjsq3fohxnREnWuNX FgOn7hklB9lCF7Tr5pdhE1RiA+yTt+bxfyHwcS3Eio8g0ataamzx9i8mjDkyk5Nn uwOnIikAEeChEksCefsP/FSQMGXN6uaEzJH+IZzBkfMXHkR7byPpF2OIkuqApco4 mrP4CMsyFlaLxPdU73XbNn7P73VEEWm/fAaX0Yf/XyK1rcOUpfinaSFgWgReABUE d0cD7MV6or8yDk3Y3ET6JjkWhKcfEe+jNzmmNbHpqKqoSnKKuMS/BHASszECAwEA AaOBrDCBqTAdBgNVHQ4EFgQUNQby/swhS5LadMlHzrs3IV4E4uYwZAYDVR0jBF0w W4AUNQby/swhS5LadMlHzrs3IV4E4uahQKQ+MDwxJjAkBgNVBAoTHUNlbGVycmEg Q2VydGlmaWNhdGUgQXV0aG9yaXR5MRIwEAYDVQQDEwllbmcxNzMxMDCCAQAwDAYD VR0TBAUwAwEB/zAUBgNVHREEDTALggllbmcxNzMxMDAwDQYJKoZIhvcNAQEFBQAD ggEBAAnDEyYWvkRWgl0OYwcZKPNqxPO/kyWFw1VITgeEHeoYz4u4LVQTJS/JdcEo OYiRBN9HLMCPpLqmzapZijN9VSmqI1mrvh1X9iDnK2iY8l3tWDHVYoVdaj9tKy3z Qb6XP88Fi3711+h8ZrLq7VjU8ByR2ICvPP8UtudRc7tkhCaVZ8ZgMmfB92b0ebVd MjM8AIx1fQIG0xpOGAuGeCQ3GCAxYVndeB+I+Dig9CUuyIVPzoqI9E8Sfu6EUrSR /v8HbDLKQdCmwJ2PzOh07qvzpbmtu9d5Z4k0UrRrOduDJ0OEw8PKzbIMHfUg3nrc 8B/8cFtxv+MUMUx+67URnJa//m8= -----END CERTIFICATE-----

Celerra Security Configuration Guide Release 6.0 59 of 102 Distribute the Control Station CA certificate You must make the Control Station CA certificate available so it can be imported by network clients and used to recognize certificates sent by Data Movers signed by this Control Station.

Step Action

1. Save the Control Station CA certificate text to a file (for example, cs_ca_cert.crt).

2. Make this.crt file available to network clients through an appropriate mechanism (FTP or email).

3. Regenerate a new key set and certificate request and import a signed certificate for any personas whose certificates are signed by the Control Station. "Creating the certificate provided by the persona" on page 47 describes this procedure.

4. If a Data Mover is a client to another Data Mover, import the new CA certificate to the appropriate Data Mover. "Obtaining CA certificates" on page 47 describes this procedure.

60 of 102 Release 6.0 Celerra Security Configuration Guide Managing PKI

"Planning considerations for Public Key Infrastructure" on page 30 provides a general description of this feature. The tasks to manage the persona key sets and certificates are: ◆ "Display key set and certificate properties" on page 61

◆ "Check for expired key sets" on page 62

◆ "Clear key sets" on page 62 The tasks to manage the CA certificate are: ◆ "Display CA certificate properties" on page 63

◆ "Check for expired CA certificates" on page 63

◆ "Delete CA certificates" on page 64

Display key set and certificate properties

Action

To display the properties of a key set and certificate, use this command syntax: $ server_certificate -persona -info {-all | | id=} where: = name of the physical Data Mover with which the persona is associated. = name of the persona. = ID of the persona. The ID is generated when the persona is created. Example: To display the key set and certificate for the persona named default, type: $ server_certificate server_2 -persona -info default

Output

server_2 : id=1 name=default next state=Not Available CURRENT CERTIFICATE: id = 1 subject = CN=test;CN=1.2.3.4 issuer = O=Celerra Certificate Authority;CN=eng173100 start date = 20070606183824Z end date = 20070706183824Z serial number = 05 signature alg. = sha1WithRSAEncryption public key alg. = rsaEncryption public key size = 4096 version = 3

Celerra Security Configuration Guide Release 6.0 61 of 102 Check for expired key sets There is no automated way to check for expired key sets and certificates. Instead you must check for expired certificates by listing the personas and examining the expiration dates of the certificates associated with each persona.

Action

To list all the key sets and certificates that are currently available, type: $ server_certificate ALL -persona -list

Output

server_2 : id=1 name=default next state=Request Pending request subject=CN=name;CN=1.2.3.4 server_3 : id=1 name=default next state=Not Available CURRENT CERTIFICATE: id=1 subject=CN=test;CN=1.2.3.4 expire=20070608183824Z issuer=O=Celerra Certificate Authority;CN=eng173100

Note

A current certificate’s expiration date is listed in the Expire field. 20070608183824Z translates to Fri June 08 18:38:24 GMT 2007.

Clear key sets You should clear a key set when it has expired, the service is not longer needed, or the certificate request will not be fulfilled. You can clear a persona’s current key set and certificate, the next key set and certificate, or both.

Action

To clear a key set and the associated certificate, use this command syntax: $ server_certificate -persona -clear { | id=} {-next | -current | -both} where: = name assigned to the physical Data Mover with which the persona is associated. = name of the persona. = ID of the persona. The ID is generated when the persona is created. Example: To clear both the current and next key set and certificate for the persona on server_2, type: $ server_certificate server_2 -persona -clear default -both

62 of 102 Release 6.0 Celerra Security Configuration Guide Output

server_2 : done

Display CA certificate properties

Action

To display the properties of a CA certificate, use this command syntax: $ server_certificate -ca_certificate -info {-all | } where: = name of the physical Data Mover with which the CA certificate is associated. = ID of the certificate.

Note: Use the -all option to display the properties of all the CA certificates available to the Data Mover.

Example: To display the properties of the CA certificate identified by certificate ID 2, type: $ server_certificate server_2 -ca_certificate -info 2

Output

server_2 : id=2 subject = C=US;O=VeriSign, Inc.;OU=Class 3 Public Primary Certification Authority issuer = C=US;O=VeriSign, Inc.;OU=Class 3 Public Primary Certification Authority start = 19960129000000Z expire = 20280801235959Z signature alg. = md2WithRSAEncryption public key alg. = rsaEncryption public key size = 2048 bits serial number = 70ba e41d 10d9 2934 b638 ca7b 03cc babf version = 1

Check for expired CA certificates There is no automated way to check for expired CA certificates. Instead you must check for expired certificates by listing the CA certificates and examining the expiration dates.

Action

To list all the CA certificates that are currently available, type: $ server_certificate ALL -ca_certificate -list

Celerra Security Configuration Guide Release 6.0 63 of 102 Output

server_2 : id=1 subject=O=Celerra Certificate Authority;CN=sorento issuer=O=Celerra Certificate Authority;CN=sorento expire=20120318032639Z id=2 subject=C=US;O=VeriSign, Inc.;OU=Class 3 Public Primary Certification Author issuer=C=US;O=VeriSign, Inc.;OU=Class 3 Public Primary Certification Author expire=20280801235959Z

server_3 : id=1 subject=O=Celerra Certificate Authority;CN=zeus-cs issuer=O=Celerra Certificate Authority;CN=zeus-cs expire=20120606181215Z

Note

A certificate’s expiration date is listed in the Expire field. 20120318032639Z translates to March 18 03:26:39 GMT 2012.

Delete CA certificates You should delete a CA certificate when it has expired, been compromised, or is no longer needed for authenticating a server.

Action

To delete a CA certificate, use this command syntax: $ server_certificate -ca_certificate -delete {-all | } where: = name of the physical Data Mover with which the CA certificate is associated. = ID of the certificate. You can determine the ID through the -ca_certificate -list command.

Note: Use the -all option to delete all the CA certificates available to the Data Mover.

Example: To delete the CA certificate on server_2 identified by its ID number, type: $ server_certificate server_2 -ca_certificate -delete 1

Output

server_2 : done

64 of 102 Release 6.0 Celerra Security Configuration Guide Troubleshooting

As part of an effort to continuously improve and enhance the performance and capabilities of its product lines, EMC periodically releases new versions of its hardware and software. Therefore, some functions described in this document may not be supported by all revisions of the software or hardware currently in use. For the most up-to-date information on product features, refer to your product release notes. If a product does not function properly or does not function as described in this document, please contact your EMC representative.

Where to get help Product information – For documentation, release notes, software updates, or for information about EMC products, licensing, and service, go to the EMC Powerlink website (registration required) at http://Powerlink.EMC.com. Troubleshooting – For troubleshooting information, go to Powerlink, search for Celerra Tools, and select Celerra Troubleshooting from the navigation panel on the left. Technical support – For technical support, go to Powerlink and choose Support. On the Support page, you can access Support Forums, request a product enhancement, talk directly to an EMC representative, or open a service request. To open a service request, you must have a valid support agreement. Please contact you EMC sales representative for details about obtaining a valid support agreement or to answer any questions about your account.

Note: Do not request a specific support representative unless one has already been assigned to your particular system problem.

Problem Resolution Roadmap for Celerra contains additional information about using Powerlink and resolving problems.

EMC E-Lab Interoperability Navigator The EMC E-LabTM Interoperability Navigator is a searchable, web-based application that provides access to EMC interoperability support matrices. It is available at http://Powerlink.EMC.com. After logging in to Powerlink, go to Support > Interoperability and Product Lifecycle Information > E-Lab Interoperability Navigator.

Troubleshooting the Control Station connection to a LDAP- based directory server Testing the Control Station connection to a LDAP-based directory server You can verify that the Control Station’s connection to an LDAP-based directory server is functioning by selecting Test on Settings > User Management (User

Celerra Security Configuration Guide Release 6.0 65 of 102 Management tasks) > Manage LDAP Domain. If you have specified both a primary and backup directory server, both connections are tested together.

Note: A backup directory server must support all the same domain settings as the primary directory server.

If one directory server cannot be accessed successfully, the Test function will report which connection attempt failed. Failure indicates that binding credentials, user or group attributes and search paths are incorrect.

Note: The user account (also known as the bind distinguished name) that Celerra uses to bind to the LDAP service must exist on the directory server.

Creating the user account that binds to the LDAP-based directory service EMC recommends that the user account used to bind to the LDAP-based directory service be as restricted as possible (such as an account whose primary group is Domain Guests). If the user account fails to bind to the directory service, check the following: 1. Verify that the GPO User Rights Assignment does not include guests in the list of users denied access to the domain controller from the network. 2. In those environments in which guests are blocked from connecting to domain controllers, the user account’s primary group may need to be Domain Users rather than Domain Guests. 3. If access problems persist, a more privileged user account must be used. Ensure that the account chosen has read/search privileges for the directory. Setting up the SSL session For the SSL session to be created successfully, the following configuration tasks must have been performed correctly: ◆ The certificate uploaded to the Control Station must be the public certificate from the CA that signed the LDAP-based directory server’s SSL server certificate. The Control Station uses this CA certificate to verify the certificate received from the LDAP server.

◆ The hostname of the LDAP-based directory server (specified in the Primary and Backup fields on Settings > User Management (User Management tasks) > Manage LDAP Domain) and the common name provided in the directory server’s certificate must match. The value you specify depends on the format of the subject in the directory server’s certificate; typically the subject is indicated by its hostname although it may be the IP address.

Troubleshooting local user accounts Enabling a disabled account by changing its password Unisphere, like the Linux operating system, enables a previously disabled local user account if you change the password for that user account. Other changes to a disabled user account do not result in the account being enabled.

66 of 102 Release 6.0 Celerra Security Configuration Guide Disabling your user account If you disable your own account while logged in (using Settings > User Management > Users > Disable): ◆ If you are logged in to Unisphere and attempt to perform any additional operations, you will receive the error "User is not allowed to perform this operation".

◆ If you are logged in to the Celerra CLI when you disable your account, you can continue to perform additional operations. However, once you log out, you will not be able to log in again. Using local user accounts Celerra provides the ability to create strictly local user accounts and domain- mapped local user accounts. You should use a local user account to log in directly to a specific Celerra. This type of local user account is relevant only to the Celerra on which it was created and is used to manage that one Celerra. The local user accounts created for domain users provide the mechanism for verifying that a user authenticated by an external directory server is authorized to access the Celerra Network Server and that it has the necessary local credentials, including a UID, to perform tasks. You should use a domain account to remotely access and manage multiple Celerras, avoiding the need to configure individual user accounts on each Celerra you manage.

Important: Do not use the local name of a domain-mapped account to log in to Celerra.

If you change an existing local user account to a domain-mapped user account, you must first create a domain-mapped group (if a domain-mapped group does not already exist) to which you can make the user a member. Otherwise, the user will be unable to log in to Celerra. Cleaning up out-of-date local user accounts In certain circumstances, you may need to manually delete out-of-date local user accounts from the Celerra. This problem only occurs when usernames are exactly alike. For example, a user Jennifer Smith has a domain-mapped local user account named JSmith. Subsequently Jennifer adopts her married name and her user account on the directory server is changed to JBrown, resulting in a new domain- mapped local user account. But when a new user Joshua Smith is created on the directory server with username JSmith and is mapped to the Celerra, he is assigned the existing local user account JSmith and is given the privileges previously assigned to Jennifer. EMC recommends that on the directory server you avoid the reuse of usernames for different physical users. If such reuse is unavoidable, then to prevent the potentially problematic situation described above, you must use Unisphere to do one of the following: ◆ In the case where a Celerra administrator’s directory username is changed, manually change the local username and domain username in the domain- mapped local user account.

Celerra Security Configuration Guide Release 6.0 67 of 102 ◆ In the case where a Celerra administrator’s account is removed from the directory server, manually delete the domain-mapped local user account and home directory. Understanding how local user account names are created When a local user account is automatically mapped from a domain user, Celerra assigns it a name based on both the user's directory server name and the domain name. If the username contains spaces, these spaces are removed. Understanding defunct storage domain user accounts If you remove a Celerra from a storage domain, the local user account mapped from the storage domain global user is marked defunct and can no longer be used to login. Even if the Celerra rejoins the storage domain with the same user account, the original local user account cannot be reenabled. Celerra maintains defunct accounts for auditing purposes. You can delete this account if you choose.

Troubleshooting domain-mapped user accounts When a domain-mapped user logs in to the Control Station, the domain name provided must match the domain name or fully qualified domain name known to Celerra. (In the case of a LDAP domain-mapped user, this is the domain name defined on Settings > User Management (User Management tasks) > Manage LDAP Domain.) Otherwise, the user will be unable to log in. The supported domain-mapped user login formats for LDAP domain-mapped users are: ◆ \ (for example, mycompany\anne)

@ (for example, anne@mycompany) The supported domain-mapped user login formats for storage domain-mapped users are: ◆ \ (for example, mycompany\anne)

@ (for example, anne@mycompany) The domain name can be specified as the fully qualified domain name. For example: ◆ \ (for example, mycompany.com\anne)

@ (for example, [email protected])

Note: Users can only log in under a single domain. Consequently, mycompany and mycompany.com are treated as the same domain.

Troubleshooting certificate imports Certificates are used by both the Data Mover and Control Station to identify one or both ends of a SSL-enabled connection. The Data Mover can import certificates encoded using Distinguished Encoding Rules (DER) format, also known as binary- encoded X.509, or Privacy Enhanced Mail (PEM) format, also known as Base64- encoded X.509. The Control Station can import certificates encoded using PEM format.

68 of 102 Release 6.0 Celerra Security Configuration Guide A certificate file in DER format is composed of binary data. PEM format uses Base64 encoding to transform binary text to ASCII text, translating each 6 bits to a specific ASCII character and enclosing the certificate text (up to 64 characters) in the lines BEGIN CERTIFICATE and END CERTIFICATE. Depending on the source of the certificate file, the PEM-encoded certificate may be preceded by other text that lists the contents of the certificate. The translation of binary text into text prevents data from being modified in transit between systems, such as through email. Importing a certificate into the Data Mover Attempting to import an expired certificate If you receive an error when importing a certificate, verify that the certificate’s “valid to” date and time have not already passed. An expired certificate cannot be imported into the Data Mover. Importing a DER-encoded certificate If you receive an error when importing a DER-encoded certificate into a Data Mover, check the following: ◆ Verify that the certificate is valid by using a tool such as OpenSSL or Microsoft Certificate Server. To use these tools, the file must have a valid extension such as .der, .cer, or .crt.

◆ If the certificate is not valid, that is, the tool reports an error, the certificate file is probably corrupted and must be replaced with an uncorrupted copy.

◆ If the certificate is valid, use the tool to export the certificate in PEM format, verify that the PEM-encoded certificate is valid, and import the PEM version of the certificate. Importing a PEM-encoded certificate If you receive an error when importing a PEM-encoded certificate into a Data Mover, check the following: ◆ Verify that the certificate file’s PEM format is correct.

◆ Verify that the certificate is valid by using a tool such as OpenSSL or Microsoft Certificate Server. If the certificate is not valid, that is, the tool reports an error, the certificate file is probably corrupted and must be replaced with an uncorrupted copy. Importing a certificate into the Control Station Checking for out-of-date certificates The Control Station does not return an error if you upload an expired certificate. But the Control Station will not use an out-of-date certificate to verify the certificate received from the LDAP-based directory server. You can determine the expiration date of the currently installed certificate by viewing the certificate’s properties in the SSL Certificate field. Determining if certificate chaining is used To increase security, some organizations use CA certificate chaining. Certificate chaining links two or more CA certificates together. The primary CA certificate is the

Celerra Security Configuration Guide Release 6.0 69 of 102 root certificate at the end of the CA certificate chain. Since Celerra needs the complete certificate chain to verify the authenticity of a certificate that is received, ask the directory server administrator if certificate chaining is used. If so, you must concatenate all the relevant certificates into a single file and upload that version. The certificate must be in PEM/Base64 encoded format and use the suffix .cer.

Error messages All new event, alert, and status messages provide detailed information and recommended actions to help you troubleshoot the situation. To view message details, use any of the following methods: ◆ Unisphere software: • Right-click on an event, alert, or status message and select to view Event Details, Alert Details, or Status Details.

◆ Celerra CLI: • Use the nas_message -info command to retrieve the detailed information for a particular error.

◆ Celerra Network Server Error Messages Guide: • Use this guide to locate information about messages that are in the earlier- release message format.

◆ Powerlink: • Use the text from the error message’s brief description to search the Knowledgebase on Powerlink. After logging in to Powerlink, go to Support > Search Support.

Training and Professional Services EMC Customer Education courses help you learn how EMC storage products work together within your environment in order to maximize your entire infrastructure investment. EMC Customer Education features online and hands-on training in state-of-the-art labs conveniently located throughout the world. EMC customer training courses are developed and delivered by EMC experts. Go to EMC Powerlink at http://Powerlink.EMC.com for course and registration information. EMC Professional Services can help you implement your Celerra Network Server efficiently. Consultants evaluate your business, IT processes, and technology and recommend ways you can leverage your information for the most benefit. From business plan to implementation, you get the experience and expertise you need, without straining your IT staff or hiring and training new personnel. Contact your EMC representative for more information.

70 of 102 Release 6.0 Celerra Security Configuration Guide Appendix A: CLI role-based access setup

A user account is always associated with a primary group and each group is assigned a role. A role defines the privileges (that is, the operations) the user can perform on a particular Celerra object. Defining role-based access for commands. This appendix provides information about how to set up role-based access for CLI commands. The first four tables list the CLI commands for which you can specify the privileges needed to perform different command actions. The object on which privileges are defined and the specific command actions available when Modify or Full Control privileges are selected are listed for each command. Using this information you can create a custom role (also known as a user role) that gives a user associated with this role exactly the privileges necessary to perform the job. Or you can associate a user with the predefined role that already includes Full Control privileges for the command. Table 9 on page 72 lists the commands with the prefix cel. Table 10 on page 72 lists the commands with the prefix fs. Table 11 on page 73 lists the commands with the prefix nas. Table 12 on page 75 lists the commands with the prefix server. You create and manage role-based user access with Settings > User Management > Roles. You can find a description of this feature in Unisphere online help. You must be root or a user who has root or security operator privileges to create a user account and to associate it with a group and role. Read-only privileges. Regardless of the role with which the user is associated, a user always has read-only privileges for all commands and command options that display information. Some of the command actions available with read-only privileges include info, list, status, and verify. Table 13 on page 78 lists commands that users associated with any role can execute. Commands not covered by the role-based access feature. Table 14 on page 78 lists the commands that are not covered by the role-based access feature. Some of these commands invoke scripts, others are based on legacy executables, and others are associated with Celerra objects that are not exposed. If the Celerra object associated with a command is not exposed in Settings > User Management > Roles > Create, you cannot create a custom (user) role that allows you to specify the privileges needed to perform different command actions. Consequently, these commands can only be performed by the default user accounts root and nasadmin or, in some cases, by a user account associated with the root and nasadmin roles. "Planning considerations for role-based user access" on page 25 describes the concepts behind this feature.

Celerra Security Configuration Guide Release 6.0 71 of 102 Table 9 cel commands

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Actions available Actions available with Included in predefined Command Object category with modify full control privileges role privileges

cel_fs Storage>File Systems extract storage admin import filemover application

Table 10 fs commands

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Actions available Actions available with Included in predefined Command Object category with modify full control privileges role privileges

fs_ckpt Data Protection>Checkpoints modify create backup operator refresh restore

fs_dhsm Storage>FileMover connection modify connection storage admin modify create filemover application delete

fs_group Storage>File Systems create storage admin delete filemover application shrink xtend

fs_rdf Storage>Storage Systems info storage admin mirror restore

fs_timefinder Storage>File Systems mirror storage admin off on refresh restore snapshot

72 of 102 Release 6.0 Celerra Security Configuration Guide Table 11 nas commands (page 1 of 2)

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Actions available Actions available with Included in Command Object category with full control modify privileges predefined role privileges

nas_ckpt_schedule Data modify create backup operator Protection>Checkpoints pause delete and resume Data Protection>VTLU

nas_copy Data Protection> create no Replication destination source interconnect

nas_devicegroup Storage>Storage acl no Systems resume suspend

nas_disk Storage>Volumes rename delete storage admin

nas_diskmark Storage>Storage mark no Systems

nas_fs Storage>File Systems modify acl storage admin rename create filemover application translate access policy start delete xtend type

nas_fsck Storage>File Systems start storage admin filemover application

nas_license System>Licenses create security operator delete init

nas_pool Storage>Pools modify create storage admin shrink delete xtend

nas_quotas Storage> edit clear storage admin Quotas off File System on

Celerra Security Configuration Guide Release 6.0 73 of 102 Table 11 nas commands (page 2 of 2)

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Actions available Actions available with Included in Command Object category with full control modify privileges predefined role privileges

nas_replicate Data modify create no Protection>Replication refresh delete failover reverse start stop switchover

nas_server System>Data Movers acl create no Protocols>CIFS rename delete (System>Data Movers object category) vdm (Protocols>CIFS object category)

nas_slice Storage>Volumes rename create storage admin delete

nas_storage Storage>Storage modify acl storage admin Systems rename delete fallback sync

nas_task Data abort no Protection>Replication delete

nas_volume Storage>Volumes rename acl storage admin xtend clone create delete

74 of 102 Release 6.0 Celerra Security Configuration Guide Table 12 server commands (page 1 of 4)

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Actions available Actions available with Included in Command Object category with modify full control privileges predefined role privileges

server_arp Networking>NIS delete network admin set

server_cdms Storage>Migration convert connect storage admin halt disconnect start

server_certificate Security>Public Key cacertificate security operator Certificates delete import persona clear generate import

server_cifs Protocols>CIFS disable add no enable delete join migrate rename replace unjoin update

server_cifssupport Protocols>CIFS acl secmap no secmap update create delete import migration

server_cpu System>Data Movers halt no reboot

server_date System>Data Movers timesvc timesvc no hosts delete start set update stop

server_devconfig Storage>Storage System rename create storage admin

server_dns Networking>DNS option delete network admin protocol

Celerra Security Configuration Guide Release 6.0 75 of 102 Table 12 server commands (page 2 of 4)

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Actions available Actions available with Included in Command Object category with modify full control privileges predefined role privileges

server_export Protocols>NFS unexport protocol (NFS) no or Protocols>CIFS

server_ftp Protocols>NFS modify service network admin service stat reset start stop

server_http Storage>FileMover modify storage admin append filemover application remove service start stop

server_ifconfig Networking>Interfaces up create network admin down delete ipsec noipsec mtu vlan

server_kerberos Protocols>CIFS keytab add security operator ccache delete kadmin

server_ldap Networking>NIS set clear network admin service start stop

server_mount Storage>File Systems all backup operator force storage admin options

server_mountpoint Storage>File Systems create backup operator delete storage admin

server_mpfsstat Storage>File Systems z storage admin Z filemover application

server_name System>Data Movers no

76 of 102 Release 6.0 Celerra Security Configuration Guide Table 12 server commands (page 3 of 4)

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Actions available Actions available with Included in Command Object category with modify full control privileges predefined role privileges

server_nfs Protocols>NFS user principal no v4 service command options client v4 service mapper set and mapping stats zero can only executed by root

server_nfsstat Protocols>NFS zero no

server_nis Networking>NIS delete network admin

server_param System>Data Movers facility no

server_rip Networking>Routing ripin network admin noripin

server_route Networking>Routing add network admin delete flush deleteAll

server_security Protocols>CIFS modify add security operator update delete

server_setup System>Data Movers load no protocol load

server_snmp Networking>NIS community network admin location syscontact

server_standby System>Data Movers activate create no restore delete

server_sysconfig Networking>Devices pci virtual network admin delete new

server_umount Storage>File Systems temp all backup operator perm storage admin

server_usermapp Protocols>CIFS disable no er enable import remove

Celerra Security Configuration Guide Release 6.0 77 of 102 Table 12 server commands (page 4 of 4)

Note: The Object category column lists the field in the Settings > User Management > Roles dialog boxes where privileges can be set.

Actions available Actions available with Included in Command Object category with modify full control privileges predefined role privileges

server_vtlu Data Protection>VTLU service set drive umount backup operator storage storage export delete extend new import tape tlu modify eject inject tlu delete

Table 13 Commands that all roles have the privileges to execute

Command

nas_inventory

server_checkup

server_df

server_ping

server_ping6

server_sysstat

server_uptime

server_version

Table 14 Commands not covered by the role-based access feature (page 1 of 3)

Command Notes

cs_standby Requires root privileges

nas_acl Can be executed with nasadmin privileges

nas_automountmap Can be executed with nasadmin privileges

nas_ca_certificate Requires root privileges to generate a certificate

78 of 102 Release 6.0 Celerra Security Configuration Guide Table 14 Commands not covered by the role-based access feature (page 2 of 3)

Command Notes

nas_cel Can be executed with nasadmin privileges

nas_checkup Can be executed with nasadmin privileges

nas_connecthome Requires root privileges to modify and test

nas_config Requires root privileges

nas_emailuser Can be executed with nasadmin privileges

nas_event Can be executed with nasadmin privileges

nas_halt Requires root privileges

nas_logviewer Can be executed with nasadmin privileges

nas_message Can be executed with nasadmin privileges

nas_mview Requires root privileges

nas_rdf Requires root privileges

nas_version Can be executed with nasadmin privileges

server_archive Can be executed with nasadmin privileges

server_cepp Can be executed with nasadmin privileges

server_dbms Requires root privileges to delete, compact, repair, and restore the database

server_file Can be executed with nasadmin privileges

server_ipsec Can be executed with nasadmin privileges

server_iscsi Can be executed with nasadmin privileges

server_log Can be executed with nasadmin privileges

server_mpfs Can be executed with nasadmin privileges

server_mt Can be executed with nasadmin privileges

server_netstat Can be executed with nasadmin privileges

server_nfs Requires root privileges to configure secure NFS mapping

server_pax Requires root privileges to reset stats

Celerra Security Configuration Guide Release 6.0 79 of 102 Table 14 Commands not covered by the role-based access feature (page 3 of 3)

Command Notes

server_snmpd Can be executed with nasadmin privileges

server_stats Can be executed with nasadmin privileges

server_tftp Can be executed with nasadmin privileges

server_user Can be executed with nasadmin privileges

server_viruschk Can be executed with nasadmin privileges

80 of 102 Release 6.0 Celerra Security Configuration Guide Appendix B: Supported SSL cipher suites

Table 15 on page 81 lists the cipher suites supported by Celerra. The following lists give the SSL or TLS cipher suites names from the relevant specification and their OpenSSL equivalents. It should be noted that several cipher suite names do not include the authentication used, for example, DES-CBC3-SHA. In these cases, RSA authentication is used. The following restrictions apply:

◆ NULL ciphers and all ADH cipher suites (because they do not allow authentication) are disabled by default.

◆ Some cipher suites will not be accepted by Celerra because of certificate size (if the certificate presented by the Data Mover has a 2048-bit key, ciphers with a smaller key will be rejected).

Table 15 Supported SSL cipher suites (page 1 of 2)

Protocol Specification name OpenSSL name

SSL v3.0 cipher suites SSL_RSA_WITH_NULL_MD5 NULL-MD5

SSL_RSA_WITH_NULL_SHA NULL-SHA

SSL_RSA_WITH_DES_CBC_SHA DES-CBC-SHA

SSL_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA

SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-EDH-RSA-DES-CBC-SHA

SSL_DHE_RSA_WITH_DES_CBC_SHA EDH-RSA-DES-CBC-SHA

SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA

SSL_DH_anon_EXPORT_WITH_RC4_40_MD5 EXP-ADH-RC4-MD5

SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA EXP-ADH-DES-CBC-SHA

SSL_DH_anon_WITH_DES_CBC_SHA ADH-DES-CBC-SHA

Celerra Security Configuration Guide Release 6.0 81 of 102 Table 15 Supported SSL cipher suites (page 2 of 2)

Protocol Specification name OpenSSL name

TLS v1.0 cipher suites TLS_RSA_WITH_NULL_MD5 NULL-MD5

TLS_RSA_WITH_NULL_SHA NULL-SHA

TLS_RSA_EXPORT_WITH_RC4_40_MD5 EXP-RC4-MD5

TLS_RSA_WITH_RC4_128_MD5 RC4-MD5

TLS_RSA_WITH_RC4_128_SHA RC4-SHA

TLS_RSA_EXPORT_WITH_DES40_CBC_SHA EXP-DES-CBC-SHA

TLS_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5

TLS_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA

AES cipher suites from TLS_RSA_WITH_AES_128_CBC_SHA AES128-SHA RFC3268, extending TLS v1.0 TLS_RSA_WITH_AES_256_CBC_SHA AES256-SHA

TLS_DHE_RSA_WITH_AES_128_CBC_SHA DHE-RSA-AES128-SHA

TLS_DHE_RSA_WITH_AES_256_CBC_SHA DHE-RSA-AES256-SHA

TLS_DH_anon_WITH_AES_128_CBC_SHA ADH-AES128-SHA

TLS_DH_anon_WITH_AES_256_CBC_SHA ADH-AES256-SHA

Additional Export 1024 TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA EXP1024-DES-CBC-SHA and other cipher suites TLS_RSA_EXPORT1024_WITH_RC4_56_SHA EXP1024-RC4-SHA Note: These ciphers can also be used in SSL v3.

SSL v2.0 cipher suites SSL_CK_DES_64_CBC_WITH_MD5 DES-CBC-MD5

SSL_CK_DES_192_EDE3_CBC_WITH_MD5 DES-CBC3-MD5

82 of 102 Release 6.0 Celerra Security Configuration Guide Appendix C: Understanding your LDAP-based directory server configuration

This appendix provides information about tools you can use to better understand the structure of your organization’s information in the LDAP-based directory server and tips about how to interpret this information. You must understand where your users and groups are located. Use this information to set up the directory server, as outlined in "Configuring the use of an external LDAP-based directory server for user identification and authentication" on page 34, and to configure the connection between the Control Station’s LDAP-based client and the directory server, accomplished by using Unisphere Settings (UI Sessions tasks) > Manage LDAP Domain. There are several tools available to manage LDAP-based directory services including:

◆ "Active Directory Users & Computers" on page 83

◆ "Ldap Admin" on page 90

Active Directory Users & Computers Active Directory user and group accounts can be managed with the Active Directory Users & Computers (ADUC) MMC Snap-in. This snap-in is installed automatically on every Windows domain controller. You access this tool from Control Panel > Administrative Tools > Active Directory Users & Computers. Table 16 on page 83 lists the information you need for a successful connection to Active Directory.

Table 16 Information required to connect to an Active Directory server

Required connection Your values information

Fully qualified domain name (also known as the base distinguished name)

Primary domain controller/directory server IP address or hostname

Secondary domain controller/directory server IP address or hostname

Account name (also known as the bind distinguished name)

Celerra Security Configuration Guide Release 6.0 83 of 102 .

Step Action

1. Open ADUC and (if necessary) connect to the domain. Right-click the domain name, and then select Find from the menu.

84 of 102 Release 6.0 Celerra Security Configuration Guide Step Action

2. Identify a domain user who will be a Celerra user. To locate the user profile, type the user's name in the Find field and click Find Now.

3. Add the X.500 path to the displayed user information by selecting View > Choose Columns.

Celerra Security Configuration Guide Release 6.0 85 of 102 Step Action

4. Select X500 Distinguished Name from the Columns available field and click Add.

5. The Find window now displays the X.500 distinguished name of this user. The X.500 distinguished name contains the user’s name (CN=Joe Muggs) and the path to the container in the directory structure where this user is located: CN=Users,DC=derbycity,DC=local. Record the path.

86 of 102 Release 6.0 Celerra Security Configuration Guide Step Action

6. Verify that all other Celerra users use the same path by: • Repeating the Find for all Celerra user accounts or • Navigating to that area of the directory in ADUC, and locating all Celerra user accounts

7. Repeat steps 1 through 6 to find the path to the container in the directory structure where the groups are located. If the user and group paths are both CN=Users,DC=,DC=[, DC=…] (for example CN=Users,DC=derbycity,DC=local), you can use the Default Active Directory option in the Unisphere Manage LDAP Domain view. This option assumes that the users and groups are located in the default container (CN=Users), so you do not have to specify the user or group search path.

Celerra Security Configuration Guide Release 6.0 87 of 102 Step Action

8. Users might not be in the default container (CN=Users). They may instead be located in other containers or organizational units within the directory, for example Celerra Users. In this case, you need to use the Custom Active Directory option in the Unisphere Manage LDAP Domain view and manually enter the search paths.

9. Groups might not be in the default container (CN=Users), and they do not have to be located with the users. They may instead be located within other containers or organizational units within the directory.

88 of 102 Release 6.0 Celerra Security Configuration Guide Step Action

10. The LDAP user and group search begins with the path specified, and searches that container and all containers below it. If Celerra users and groups are not located within the same container or organizational unit, you must use the intersection (common parts) of their collective paths when you specify the user and group search paths. In some cases, this may need to be the root of the domain. For example, assume that Celerra users are stored in the following two Active Directory locations: Path 1: CN=Users,DC=derbycity,DC=local Path 2: OU=Celerra Users,OU=EMC Celerra,DC=derbycity,DC=local In order for Celerra to find all users, you need to use the intersection of the two paths as your search path, that is, the domain root DC=derbycity,DC=local. Type this value in the User Search Path field in the Unisphere Manage LDAP Domain view.

11. Use the Find window again to determine the full X.500 path of the account you will use to connect the Celerra Control Station to the directory. In this case you should not remove the username from the path because you are specifying the path to an individual account.

If you are using the Default Active Directory option in the Unisphere Manage LDAP Domain view, type only the account name, for example Celerra LDAP Binding, in the Account Name field. You do not need to provide the X.500 syntax because the Celerra software constructs the full X.500 path. If you are using the Custom Active Directory option in Manage LDAP Domain, then type the full X.500 path in the Distinguished Name field.

Celerra Security Configuration Guide Release 6.0 89 of 102 Ldap Admin Unlike Active Directory, other LDAP-based directory servers do not typically ship with a GUI management interface. In this case you might use a tool like Ldap Admin to find the proper search paths on LDAP servers. The free Ldap Admin tool (a Windows LDAP manager available from ldapadmin.sourceforge.net) lets you browse, search, modify, create, and delete objects on a LDAP server. Ldap Admin’s copy-to-clipboard functionality is especially useful for easily transferring values into the Unisphere Settings (UI Sessions tasks) > Manage LDAP Domain fields. Table 17 on page 90 lists the information you need for a successful connection to a customized Active Directory or other LDAP-based directory server such as OpenLDAP.

Table 17 Information required to connect to a customized Active Directory or other directory LDAP-based directory server

Required connection Your values information

Fully qualified domain name (also known as the base distinguished name)

Primary directory server IP address or hostname

Secondary directory server IP address or hostname

Distinguished name (also known as the bind distinguished name)

User search path

User name attribute

Group search path

Group name attribute

Group class

Group member

90 of 102 Release 6.0 Celerra Security Configuration Guide .

Step Action

1. Start Ldap Admin and create a new connection. Click Test connection to verify the connection.

Celerra Security Configuration Guide Release 6.0 91 of 102 Step Action

2. Open the connection to the LDAP server, right-click the domain name, and then select Search from the menu.

3. Identify an LDAP user who will be a Celerra user. To locate the user profile, type the user’s name in the Name field and click Start.

92 of 102 Release 6.0 Celerra Security Configuration Guide Step Action

4. Right-click the appropriate user from the results list, and then select Go to from the menu. You will use this user to determine the user and group search paths. Close the Search window.

Celerra Security Configuration Guide Release 6.0 93 of 102 Step Action

5. On the main Ldap Admin window, notice that the status bar contains the distinguished name (DN) of the folder in which the user is located. Many LDAP servers follow the convention outlined in RFC2307 and put users in a People container.

6. Right-click the folder, and then select Copy dn to clipboard from the menu.

94 of 102 Release 6.0 Celerra Security Configuration Guide Step Action

7. In the Unisphere Manage LDAP Domain view, select the Other Directory Servers option. Paste the DN value in the User Search Path field.

8. Verify that all other Celerra users use the same path by: • Repeating the Search for all Celerra user accounts or • Navigating to that area of the directory in Ldap Admin, and locating all Celerra user accounts

Celerra Security Configuration Guide Release 6.0 95 of 102 Step Action

9. Repeat steps 2 through 8 to search on a group name to find the path to the container in the directory structure where the groups are located. When you search by group name, you have to use an advanced search and supply a search filter in the form cn=. Once the search is complete, right-click the appropriate group from the results list, and then select Go to from the menu.

10. The LDAP user and group search begins with the path specified, and searches that container and all containers below it. If Celerra users and groups are not located within the same container or organizational unit, you must use the intersection (common parts) of their collective paths when you specify the user and group search paths. In some cases, this may need to be the root of the domain. For example, assume that Celerra users are stored in the following two LDAP locations: Path 1: OU=People,DC=openldap-eng,DC=local Path 2: OU=Celerra Users,OU=EMC Celerra, DC=openldap-eng,DC=local In order for Celerra to find all Celerra users, you need to use the intersection of the two paths as your search path, that is, the domain root DC=openldap-eng,DC=local.

96 of 102 Release 6.0 Celerra Security Configuration Guide Step Action

11. Use the Search window to locate the user account you will use to connect the Celerra Control Station to the directory. Right-click the account name, and then select Copy dn to clipboard. Paste the DN value in the Distinguished Name field in the Unisphere Manage LDAP Domain view, for example uid=celerra,ou=People.

Celerra Security Configuration Guide Release 6.0 97 of 102 98 of 102 Release 6.0 Celerra Security Configuration Guide L Index LDAP-based directories structure 23 LDAP-based directory server A tools 83 access policies 17 troubleshooting 66 administrative privileges 13, 20 using for user identification and authentication 13, 34 auditing 12 login banner 11 customizing 41 C CA certificates M acquiring 54 message of the day 11 deleting 64 creating 42 displaying 58 MOTD 11 displaying properties 63 distributing 60 generating 57 N importing 32, 57 network services management 11, 16 listing 54, 63 NFS obtaining 32, 47 hide exports 16 certificate verification 24 security settings 16 certificates, public key checksum support 10, 11 P CIFS Kerberos authentication 16 Packet Reflect 18 Control Station passwords auditing 12 changing default 30 configuring use of directory server 34 defining policy using a script 37 Linux operating system changes 10 defining specific policy definitions 38 login banner 11 quality policy 14, 29 MOTD 11 setting expiration 38 network services management 11 personas password quality policy 14 generating key set 30 role-based user access 13 importing certificate 30 security 5, 10 providing a certificate 47 security for infrastructure 11 requesting signed certificate 30 security to control access 13 PKI 44 security to protect data 15 public key certificates 19 session timeout 11 CA certificates 32 SSL (X.509) certificates 15 clearing 62 user identification and authentication 13 creating 47 using as a CA 47 displaying 61 using LDAP-based directory server 13 generating a key set and certificate request 48 cookie 10, 11 importing a CA-signed certificate 52 lising 62 D personas 30 Data Mover sending the certificate request to the CA 51 access policies 17 Public Key Infrastructure See PKI CIFS Kerberos authentication 16 network services management 16 R NFS security settings 16 role-based user access 13 Packet Reflect 18 creating 26 PKI 19 default 28 security 5, 10 security to protect data 19 security to secure infrastructure 16 S SNMP management 17 Secure Socket Layer See SSL SSL (X.509) certificates 19 session timeout 11 Windows-style credentials for UNIX users 17 changing 40 configuring 39

Celerra Security Configuration Guide Release 6.0 99 of 102 disabling 40 session tokens 10, 11 changing the SHA1 secret value 43 SHA1 10, 11 SNMP management 17 SSL 24 changing the cipher suite 45 changing the protocol version 44 supported cipher suites 81 troubleshooting 66 using certificates for Control Station and LDAP-based directory server connection 15 using certificates with Celerra Manager 15 using certificates with HTTP 19, 44 using certificates with LDAP 19, 44

T troubleshooting 65 Control Station connection to directory server 66 creating binding account 66 domain-mapped user accounts 68 local user accounts 66 setting up SSL session 66

U user identification and authentication 13 interface support 20 planning 20 user interface choices 5 users accessing Celerra 22 creating 21 creating groups 25 creating roles 26 default 20 identifying and authenticating using a directory server 22 local versus domain-mapped 21 troubleshooting 66, 68

W Windows-style credentials 17

100 of 102 Release 6.0 Celerra Security Configuration Guide Notes

Celerra Security Configuration Guide Release 6.0 101 of 102 About this document

As part of its effort to continuously improve and enhance the performance and capabilities of the Celerra Network Server product line, EMC periodically releases new versions of Celerra hardware and software. Therefore, some functions described in this document may not be supported by all versions of Celerra software or hardware presently in use. For the most up-to-date information on product features, see your product release notes. If your Celerra system does not offer a function described in this document, contact your EMC Customer Support Representative for a hardware upgrade or software update. Comments and suggestions about documentation

Your suggestions will help us improve the accuracy, organization, and overall quality of the user documentation. Send a message to [email protected] with your opinions of this document.

Copyright © 1998-2010 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date regulatory document for your product line, go to the Technical Documentation and Advisories section on EMC Powerlink. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners.

102 of 102 Release 6.0