Table Of ContentVeritas NetBackup™
Appliance Security Guide
Release 2.7.2
NetBackup 52xx and 5330
Veritas NetBackup™ Appliance Security Guide
Documentationversion:2.7.2
Legal Notice
Copyright©2016VeritasTechnologiesLLC.Allrightsreserved.
Veritas,theVeritasLogo,NetBackup,andStorageFoundationaretrademarksorregistered
trademarksofVeritasTechnologiesLLCoritsaffiliatesintheU.S.andothercountries.Other
namesmaybetrademarksoftheirrespectiveowners.
ThisproductmaycontainthirdpartysoftwareforwhichVeritasisrequiredtoprovideattribution
tothethirdparty(“ThirdPartyPrograms”).SomeoftheThirdPartyProgramsareavailable
underopensourceorfreesoftwarelicenses.TheLicenseAgreementaccompanyingthe
Softwaredoesnotalteranyrightsorobligationsyoumayhaveunderthoseopensourceor
freesoftwarelicenses.PleaseseetheThirdPartyLegalNoticeAppendixtothisDocumentation
orTPIPReadMeFileaccompanyingthisproductformoreinformationontheThirdParty
Programs.
Theproductdescribedinthisdocumentisdistributedunderlicensesrestrictingitsuse,copying,
distribution,anddecompilation/reverseengineering.Nopartofthisdocumentmaybe
reproducedinanyformbyanymeanswithoutpriorwrittenauthorizationofVeritasTechnologies
LLCanditslicensors,ifany.
THEDOCUMENTATIONISPROVIDED"ASIS"ANDALLEXPRESSORIMPLIED
CONDITIONS,REPRESENTATIONSANDWARRANTIES,INCLUDINGANYIMPLIED
WARRANTYOFMERCHANTABILITY,FITNESSFORAPARTICULARPURPOSEOR
NON-INFRINGEMENT,AREDISCLAIMED,EXCEPTTOTHEEXTENTTHATSUCH
DISCLAIMERSAREHELDTOBELEGALLYINVALID.VERITASTECHNOLOGIESLLC
SHALLNOTBELIABLEFORINCIDENTALORCONSEQUENTIALDAMAGESIN
CONNECTIONWITHTHEFURNISHING,PERFORMANCE,ORUSEOFTHIS
DOCUMENTATION.THEINFORMATIONCONTAINEDINTHISDOCUMENTATIONIS
SUBJECTTOCHANGEWITHOUTNOTICE.
TheLicensedSoftwareandDocumentationaredeemedtobecommercialcomputersoftware
asdefinedinFAR12.212andsubjecttorestrictedrightsasdefinedinFARSection52.227-19
"CommercialComputerSoftware-RestrictedRights"andDFARS227.7202,etseq.
"CommercialComputerSoftwareandCommercialComputerSoftwareDocumentation,"as
applicable,andanysuccessorregulations,whetherdeliveredbyVeritasasonpremisesor
hostedservices.Anyuse,modification,reproductionrelease,performance,displayordisclosure
oftheLicensedSoftwareandDocumentationbytheU.S.Governmentshallbesolelyin
accordancewiththetermsofthisAgreement.
VeritasTechnologiesLLC
500EMiddlefieldRoad
MountainView,CA94043
http://www.veritas.com
Technical Support
TechnicalSupportmaintainssupportcentersglobally.TechnicalSupport’sprimary
roleistorespondtospecificqueriesaboutproductfeaturesandfunctionality.The
TechnicalSupportgroupalsocreatescontentforouronlineKnowledgeBase.The
TechnicalSupportgroupworkscollaborativelywiththeotherfunctionalareaswithin
thecompanytoansweryourquestionsinatimelyfashion.
Oursupportofferingsincludethefollowing:
■ Arangeofsupportoptionsthatgiveyoutheflexibilitytoselecttherightamount
ofserviceforanysizeorganization
■ Telephoneand/orWeb-basedsupportthatprovidesrapidresponseand
up-to-the-minuteinformation
■ Upgradeassurancethatdeliverssoftwareupgrades
■ Globalsupportpurchasedonaregionalbusinesshoursor24hoursaday,7
daysaweekbasis
■ PremiumserviceofferingsthatincludeAccountManagementServices
Forinformationaboutoursupportofferings,youcanvisitourwebsiteatthefollowing
URL:
www.veritas.com/support
Allsupportserviceswillbedeliveredinaccordancewithyoursupportagreement
andthethen-currententerprisetechnicalsupportpolicy.
Contacting Technical Support
CustomerswithacurrentsupportagreementmayaccessTechnicalSupport
informationatthefollowingURL:
www.veritas.com/support
BeforecontactingTechnicalSupport,makesureyouhavesatisfiedthesystem
requirementsthatarelistedinyourproductdocumentation.Also,youshouldbeat
thecomputeronwhichtheproblemoccurred,incaseitisnecessarytoreplicate
theproblem.
WhenyoucontactTechnicalSupport,pleasehavethefollowinginformation
available:
■ Productreleaselevel
■ Hardwareinformation
■ Availablememory,diskspace,andNICinformation
■ Operatingsystem
■ Versionandpatchlevel
■ Networktopology
■ Router,gateway,andIPaddressinformation
■ Problemdescription:
■ Errormessagesandlogfiles
■ TroubleshootingthatwasperformedbeforecontactingTechnicalSupport
■ Recentsoftwareconfigurationchangesandnetworkchanges
Licensing and registration
Ifyourproductrequiresregistrationoralicensekey,accessourtechnicalsupport
WebpageatthefollowingURL:
www.veritas.com/support
Customer service
CustomerserviceinformationisavailableatthefollowingURL:
www.veritas.com/support
CustomerServiceisavailabletoassistwithnon-technicalquestions,suchasthe
followingtypesofissues:
■ Questionsregardingproductlicensingorserialization
■ Productregistrationupdates,suchasaddressornamechanges
■ Generalproductinformation(features,languageavailability,localdealers)
■ Latestinformationaboutproductupdatesandupgrades
■ Informationaboutupgradeassuranceandsupportcontracts
■ Adviceabouttechnicalsupportoptions
■ Nontechnicalpresalesquestions
■ IssuesthatarerelatedtoCD-ROMs,DVDs,ormanuals
Support agreement resources
Ifyouwanttocontactusregardinganexistingsupportagreement,pleasecontact
thesupportagreementadministrationteamforyourregionasfollows:
Worldwide(exceptJapan) [email protected]
Japan [email protected]
Contents
Technical Support
............................................................................................ 4
Chapter 1 About the NetBackup Appliance Security Guide
.......................................................................................... 10
AbouttheNetBackupApplianceSecurityGuide.................................. 10
Chapter 2 User authentication
........................................................... 18
AboutuserauthenticationontheNetBackupappliance........................ 18
UsertypesthatcanauthenticateontheNetBackup
appliance........................................................................ 20
Aboutconfiguringuserauthentication............................................... 23
Generic user authentication guidelines ....................................... 26
AboutauthenticatingLDAPusers.................................................... 26
AboutauthenticatingActiveDirectoryusers....................................... 27
AboutauthenticatingKerberos-NISusers.......................................... 28
Abouttheapplianceloginbanner..................................................... 29
Aboutusernameandpasswordspecifications................................... 30
Chapter 3 User authorization
............................................................. 35
AboutuserauthorizationontheNetBackupappliance.......................... 35
AboutauthorizingNetBackupapplianceusers.................................... 36
NetBackupapplianceuserroleprivileges.................................... 38
AbouttheAdministratoruserrole..................................................... 39
AbouttheNetBackupCLIuserrole................................................... 40
Chapter 4 Intrusion prevention and intrusion detection
systems
.......................................................................... 42
AboutSymantecDataCenterSecurityontheNetBackup
appliance.............................................................................. 43
AbouttheNetBackupapplianceintrusionpreventionsystem................. 45
AbouttheNetBackupapplianceintrusiondetectionsystem................... 46
ReviewingSDCSeventsontheNetBackupappliance..........................47
Contents 8
RunningSDCSinunmanagedmodeontheNetBackup
appliance.............................................................................. 50
RunningSDCSinmanagedmodeontheNetBackupappliance............. 50
OverridingtheNetBackupapplianceintrusionpreventionsystem
policy................................................................................... 51
Re-enablingtheNetBackupapplianceintrusionpreventionsystem
policy................................................................................... 54
Chapter 5 Log files
................................................................................ 57
AboutNetBackupappliancelogfiles.................................................57
AbouttheCollectLogfileswizard.................................................... 59
ViewinglogfilesusingtheSupportcommand..................................... 60
WheretofindNetBackupappliancelogfilesusingtheBrowse
command ............................................................................. 61
GatheringdevicelogswiththeDataCollectcommand.......................... 62
Chapter 6 Operating system security
.............................................. 66
AboutNetBackupapplianceoperatingsystemsecurity......................... 66
MajorcomponentsoftheNetBackupapplianceOS............................. 67
DisabledserviceaccountsontheNetBackupappliance....................... 68
VulnerabilityscanningoftheNetBackupappliance.............................. 69
Chapter 7 Data security
....................................................................... 70
AboutDataSecurity...................................................................... 70
AboutDataIntegrity...................................................................... 71
AboutDataClassification............................................................... 72
AboutDataEncryption .................................................................. 72
KMS support ........................................................................ 73
Chapter 8 Web security
....................................................................... 75
AboutSSLcertification.................................................................. 75
Implementingthird-partySSLcertificates........................................... 76
Chapter 9 Network security
................................................................ 78
AboutIPsecChannelConfiguration.................................................. 78
AbouttheNetBackupAppliance52xxports........................................80
Contents 9
Chapter 10 Call Home security
............................................................ 83
About AutoSupport ...................................................................... 83
AboutCallHome.......................................................................... 84
ConfiguringCallHomefromtheNetBackupApplianceShell
Menu ............................................................................. 86
EnablinganddisablingCallHomefromtheNetBackupAppliance
ShellMenu......................................................................87
ConfiguringaCallHomeproxyserverfromtheNetBackup
ApplianceShellMenu........................................................87
UnderstandingtheCallHomeworkflow....................................... 88
About SNMP ............................................................................... 89
AbouttheManagementInformationBase(MIB)............................ 89
Chapter 11 IPMI security
....................................................................... 91
IntroductiontoIPMIconfiguration..................................................... 91
RecommendedIPMIsettings.......................................................... 91
ReplacingthedefaultIPMISSLcertificate......................................... 93
Appendix A Software packages included in the NetBackup
appliance OS
................................................................ 98
ListofsoftwarepackagesincludedintheNetBackupappliance
OS ...................................................................................... 98
Index
.................................................................................................................. 104
1
Chapter
About the NetBackup
Appliance Security Guide
Thischapterincludesthefollowingtopics:
■ AbouttheNetBackupApplianceSecurityGuide
About the NetBackup Appliance Security Guide
TheNetBackupappliancesaredevelopedfromtheirinceptionwithsecurityasa
primaryneed.Eachelementoftheappliance,includingitsLinuxoperatingsystem
andthecoreNetBackupapplication,istestedforvulnerabilitiesusingbothindustry
standardsandadvancedsecurityproducts.Thesemeasuresensurethatexposure
tounauthorizedaccessandresultingdatalossortheftisminimized.
EachnewversionofNetBackupappliancesoftwareandhardwareisverifiedfor
vulnerabilitiesbeforerelease.Dependingontheseverityofissuesfound,Veritas
willaddressthemusingapatchorthroughascheduledmajorrelease.Toreduce
theriskofunknownthreats,Veritasregularlyupdatesthethird-partypackagesand
modulesthatareusedintheproductaspartofregularmaintenancereleasecycles.
ThegoalofthisguideistodescribethesecurityfeaturesimplementedinNetBackup
Appliance2.7.2andincludesthefollowingchaptersandsub-sections:
NetBackup appliance user authentication
ThischaptertalksabouttheauthenticationfeaturesoftheNetBackupappliance
andincludesthefollowingsections:
Description:Each element of the appliance, including its Linux operating system and the core NetBackup application, is tested for vulnerabilities using both