Veritas Access Appliance Initial Configuration Guide

Last Published:
Product(s): Appliances (8.0)
Platform: Access Appliance OS,Veritas 3340,Veritas 3350
  1. Getting to know the Access Appliance
    1.  
      About the Veritas Access Appliance
    2. About the Access Appliance administration interfaces
      1.  
        Using the Access Appliance shell menu
    3.  
      About licensing the Access Appliance
    4.  
      Where to find the documentation
  2. Preparing to configure the appliance
    1.  
      Initial configuration requirements
    2.  
      About obtaining IP addresses for Veritas Access
    3.  
      Network and firewall requirements
    4.  
      About network connections for the appliance
  3. Configuring the appliance for the first time
    1. How to configure the Access Appliance for the first time
      1.  
        Configuring the Access cluster on the appliance
  4. Getting started with the Veritas Access GUI
    1.  
      Accessing the Veritas Access web interface
  5. Network connection management
    1. Configuring network address settings on the appliance nodes
      1.  
        Deleting network settings on appliance nodes
      2.  
        About NIC1 (eth0) port usage on the appliance nodes
      3.  
        About IPv4-IPv6-based network support on the Access Appliance
    2. Configuring VLAN settings on the appliance nodes
      1.  
        Viewing VLAN settings
      2.  
        Deleting a VLAN
    3. About the Veritas Remote Management Console
      1.  
        Configuring the IPMI port on an appliance node
      2.  
        Managing IPMI users on an appliance node
      3.  
        Resetting the IPMI on an appliance node
  6. Monitoring the appliance
    1.  
      About hardware monitoring in the Access GUI
    2. About Veritas AutoSupport on the Access Appliance
      1.  
        Setting up AutoSupport on the appliance
      2.  
        Using a proxy server with the appliance
    3.  
      Setting up email notifications on the appliance
    4.  
      Setting up SNMP notifications on the appliance
    5.  
      Testing the appliance hardware
  7. Resetting the appliance to factory settings
    1.  
      About appliance factory reset
    2.  
      Performing factory reset for cluster nodes
  8. Appliance security
    1.  
      About Access Appliance security
    2. About Access appliance user account privileges
      1. Access appliance admin password specifications
        1.  
          Password encryption and handling on the Access appliance
    3.  
      About forced password changes
    4.  
      Changing the Maintenance user account password
    5. About the Access Appliance intrusion detection system
      1.  
        Reviewing SDCS events on the Access Appliance
      2.  
        Auditing the SDCS logs on an Access Appliance
      3.  
        About SDCS event type codes and severity codes on an Access appliance node
      4.  
        Changing the SDCS log retention settings on an Access Appliance node
    6.  
      About the Access Appliance intrusion prevention system
    7. About Access appliance operating system security
      1.  
        Vulnerability scanning of the Access Appliance
      2.  
        Disabled service accounts on the Access appliance
    8.  
      About data security on the Access appliance
    9.  
      About data integrity on the Access appliance
    10. Recommended IPMI settings on the Access appliance
      1.  
        Replacing the default IPMI SSL certificate on the Access appliance

Network and firewall requirements

Appliance ports

In addition to the ports that are used by the Veritas Access software, the appliance also provides for both in-band and out-of-band management. The out-of-band management is through a separate network connection, the Remote Management Module (RMM), and the Intelligent Platform Management Interface (IPMI). Open these ports through the firewall as appropriate to allow access to the management services from a remote laptop or KVM (keyboard, video monitor, mouse).

Table: Inbound ports lists the ports open for inbound communication to the appliance.

Table: Inbound ports

Port

Service

Description

Open on interface

( 3340 model)

Open on interface

(3350 model)

22

ssh

In-band management CLI

eth1, eth2, eth3, eth4, eth5

eth1, eth4, eth5, eth6, eth7

443

HTTPS

In-band management GUI

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

623

KVM

(optional, used if open)

eth4, eth5

eth4, eth5, eth6, eth7

2049

HTTPS

NFS++

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

445

CIFS

SAMBA

CIFS (for the Log/Install shares)

eth1, eth2, eth4, eth5

eth1, eth2, eth4, eth5, eth6, eth7

10082

spoold

Veritas Data Deduplication engine

eth4, eth5

eth4, eth5, eth6, eth7

10102

spad

Veritas Data Deduplication manager

eth4, eth5

eth4, eth5, eth6, eth7

* Veritas Remote Management - Remote Console

++ Once the NFS service is shut down, the vulnerability scanners do not pick up these ports as threats.

Table: Outbound ports lists the ports outbound from the appliance to allow alerts and notifications to the indicated servers.

Table: Outbound ports

Port

Service

Description

Open on interface

(3340 model)

Open on interface

(3350 model)

443

HTTPS

Call Home notifications to Veritas

Download SDCS certificate

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

162**

SNMP

Traps sent by SNMP agents

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

22

SFTP

Log uploads to Veritas

eth1, eth2, eth3, eth4, eth5

eth1,eth4,eth5, eth6, eth7

25

SMTP

Email alerts

eth1, eth4, eth5

eth1, eth4, eth5, eth6, eth7

389

LDAP

LDAP

eth1

eth1

636

LDAPS

Secure LDAP

eth1

eth1

514

rsyslog

Log forwarding

eth1, eth2, eth4, eth5

eth1, eth2, eth4, eth5, eth6, eth7

8514

Log transfer service

Log Transfer Console for downloading logs

eth1

eth1

10082

spoold

Veritas Data Deduplication engine

eth4, eth5

eth4, eth5, eth6, eth7

10102

spad

Veritas Data Deduplication manager

eth4, eth5

eth4, eth5, eth6, eth7

** This port number can be changed within the appliance configuration to match the remote server.

Table: Out of band management ports lists the out of band management ports on the appliance.

Table: Out of band management ports

Port

Service

Description

Open on interface

(3340 model)

Open on interface

(3350 model)

80

HTTP

Out-of-band management (ISM+ or RM*)

eth4, eth5

eth4, eth5, eth6, eth7

443

HTTP

Out-of-band management (ISM+ or RM*)

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

623

KVM

(optional, used if open)

eth4, eth5

eth4, eth5, eth6, eth7

7578

RMM

CLI access

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

7582

RMM

KVM

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

2049

HTTPS

NFS ++

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

445

CIFS (for the Log/Install shares)

eth1, eth2, eth4, eth5

eth1, eth2, eth4, eth5, eth6, eth7

+ NetBackup Integrated storage manager

* Veritas Remote Management - Remote Console

++ Once the NFS service is shut down, the vulnerability scanners do not pick up these ports as threats.

Note:

Ports 7578, 5120, and 5123 are for the unencrypted mode. Ports 7582, 5124, and 5127 are for the encrypted mode.

Veritas Access ports

Table: Default Veritas Access ports displays the default ports that Access uses to transfer information.

Table: Default Veritas Access ports

Port

Protocol or Service

Purpose

Impact if blocked

Open on interface

(3340 model)

Open on interface

(3350 model)

22

SSH

Secure access to the Access server

Access is not accessible.

eth1, eth2, eth3, eth4, eth5

eth1, eth4, eth5, eth6, eth7

25

SMTP

Sending SMTP messages.

The SMTP messages that are sent from Access are blocked.

eth1, eth4, eth5

eth1, eth4, eth5, eth6, eth7

53

DNS queries

Communication with the DNS server

Domain name mapping fails.

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

111

rpcbind

RPC portmapper services

RPC services fail.

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

123

NTP

Communication with the NTP server

Server clocks are not synchronized across the cluster. NTP-reliant features (such as DAR) are not available.

eth1, eth4, eth5

eth1, eth4, eth5, eth6, eth7

139

CIFS

CIFS client to server communication

CIFS clients cannot access the Access cluster

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

161

SNMP

Sending SNMP alerts

SNMP alerts cannot be broadcast.

eth1, eth4, eth5

eth1, eth4, eth5, eth6, eth7

445

CIFS

CIFS client to server communication

CIFS clients cannot access the Access cluster.

eth1, eth2, eth4, eth5

eth1, eth2, eth4, eth5, eth6, eth7

514

syslog

Logging program messages

Syslog messages are not recorded.

eth1, eth2, eth4, eth5

eth1, eth2, eth4, eth5, eth6, eth7

756, 757, 755

statd

NFS statd port

NFS v3 protocol cannot function correctly.

eth1, eth2, eth4, eth5

eth1, eth2, eth4, eth5, eth6, eth7

2049

NFS

NFS client to server communication

NFS clients cannot access the Access cluster.

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

3172, 3173

ServerView

ServerView port

ServerView cannot work.

eth1, eth4, eth5

eth1, eth4, eth5, eth6, eth7

3260

iSCSI

SCSI target and initiator communication

Initiator cannot communicate with the target.

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

4001

mountd

NFS mount protocol

NFS clients cannot mount file systems in the Access cluster.

eth1, eth4, eth5

eth1,eth4,eth5, eth6, eth7

4045

lockd

Processes the lock requests

File locking services are not available.

eth1, eth2, eth4, eth5

eth1, eth2, eth4, eth5, eth6, eth7

5634

HTTPS

Management Server connectivity

Web GUI may not be accessible.

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

56987

Replication

File synchronization, Access replication

Access replication daemon is blocked. Replication cannot work.

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

8088

REST server

REST client to server communication

REST client cannot access REST API of Access.

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

8143

S3

Data port for Veritas Access S3 server

User will not able to use Veritas Access object server.

eth1, eth4, eth5

eth1, eth4, eth5, eth6, eth7

8144

ObjectAccess service

Administration port for Veritas Access S3 server.

User cannot create access or secret keys for using Objectaccess service.

eth1, eth4, eth5

eth1,eth4,eth5, eth6, eth7

11211

Memcached port

CLISH framework

CLISH cannot function correctly, and cluster configuration may get corrupted.

eth2

eth2

14161

HTTPS

Access Veritas Access GUI

User is unable to access Veritas Access GUI

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

51001

UDP

LLT over RDMA

LLT is not working.

eth2

eth2

51002

UDP

LLT over RDMA

LLT is not working.

eth2

eth2

NetBackup ports

NetBackup uses TCP/IP connections to communicate between one or more TCP/IP ports. Depending on the type of operation and configuration on the environment, different ports are required to enable the connections. NetBackup has different requirements for operations such as backup, restore, and administration.

Table: Default NetBackup TCP and UDP ports shows some of the most-common TCP and UDP ports that NetBackup uses to transfer information. For more information, see the Veritas NetBackup Security and Encryption Guide.

Table: Default NetBackup TCP and UDP ports

Port Range

Protocol

Open on interface

(3340 model)

Open on interface

(3350 model)

1556

TCP, UDP

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

13701-13702, 13705-13706

TCP

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

13711, 13713, 13715-13717, 13719

TCP

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

13720-13722

TCP, UDP

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

13723

TCP

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

13724

TCP, UDP

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

13782-13783

TCP, UDP

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

13785

TCP

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

CIFS protocols and firewall ports

For the CIFS service to work properly in an Active Directory (AD) domain environment, the following protocols and firewall ports need be allowed or opened to enable the CIFS server to communicate smoothly with Active Directory Domain Controllers and Windows/CIFS clients.

Internet Control Message Protocol (ICMP) protocol must be allowed through the firewall from the CIFS server to the domain controllers. Enable "Allow incoming echo request" is required for running the CIFS service.

Table: Additional CIFS ports and protocols lists additional CIFS ports and protocols.

Table: Additional CIFS ports and protocols

Port

Protocol

Purpose

Open on interface

(3340 model)

Open on interface

(3350 model)

53

TCP, UDP

DNS

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

88

TCP, UDP

Kerberos

eth4, eth5

eth4, eth5, eth6, eth7

139

TCP

DFSN, NetBIOS Session Service, NetLog

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

445

TCP, UDP

SMB, CIFS, SMB2, DFSN, LSARPC, NbtSS, NetLogonR, SamR, SrvSvc

eth1, eth2, eth4, eth5

eth1, eth2, eth4, eth5, eth6, eth7

464

TCP, UDP

Kerberos change or set a password

eth1, eth2, eth3, eth4, eth5

eth1, eth2, eth3, eth4, eth5, eth6, eth7

3268

TCP

LDAP GC

eth4, eth5

eth4, eth5, eth6, eth7

4379

TCP

CTDB in CIFS

eth1,eth2, eth4, eth5

eth1, eth2, eth4, eth5, eth6, eth7

Table: LDAP with SSL ports lists the ports that are required for LDAP with SSL.

Table: LDAP with SSL ports

Port

Protocol

Purpose

Open on interface

(3340 model)

Open on interface

(3350 model)

636

TCP

LDAP SSL

eth1

eth1

3269

TCP

LDAP GC SSL

eth4, eth5

eth4, eth5, eth6, eth7