Veritas NetBackup™ Appliance Security Guide
- About the NetBackup appliance Security Guide
- User authentication
- About user authentication on the NetBackup appliance
- About configuring user authentication
- About user name and password specifications
- User authorization
- Intrusion prevention and intrusion detection systems
- Log files
- Operating system security
- Data security
- Web security
- Network security
- Call Home security
- Remote Management Module (RMM) security
- STIG and FIPS conformance
- Appendix A. Security release content
About implementing ECA certificates
NetBackup appliance's web service uses the PKCS#12 standard and requires certificate files to be in the X.509 (.pem
or .cer
) format. If the certificate files are in the .der
, .DER
, or .p7b
formats, NetBackup appliance automatically converts the files to an accepted format.
To prevent errors while importing certificates, ensure that the external certificate files meet the following requirements.
Certificate files are in the
.pem
file format and begin with "-----BEGIN CERTIFICATE-----".Certificate files contain the host name and FQDN in the subject alternative name (SAN) field of the certificate. If the certificate is used in an HA environment, the SAN field must contain VIP, host name, and FQDN.
Subject name and common name fields are not empty.
Subject fields are unique for each host.
Subject fields contain a maximum of 255 characters.
Server and client authentication attributes are set in the certificate.
Only ASCII 7 characters are used in the subject and SAN fields of the certificate.
The private key file is in the PKCS#8 PEM format and begins with -----BEGIN ENCRYPTED PRIVATE KEY----- or -----BEGIN PRIVATE KEY-----.
Although optional, you can use the Settings > Security > Certificate > CertificateSigningRequest > Create command to generate a CSR. Copy the CSR content from the command line to your ECA portal to obtain the required external certificate files.
Starting from version 4.1, you can register an ECA on both NetBackup appliance and NetBackup using the Settings > Security > Certificate > Import command.
Perform the following steps to import the host certificate, host private key, and trust store to register the ECA on NetBackup and NetBackup appliance. Both NetBackup and NetBackup appliance layers use the same host certificate, host private key, and trust store.
- Log in to the appliance as an Administrator user.
- From the NetBackup Appliance Shell Menu, run the Settings > Security > Certificate > Import command. The following NFS and CFS share locations are now accessible:
NFS:
/inst/share
CFS:
\\<ApplianceName>\general_share
- Upload the certificate file, trust store file, and private key file to either of the share locations and enter the paths to the files.
- Choose how to access the certificate revocation list (CRL). A CRL comprises a list of external certificates that have been revoked by the ECA and should not be trusted. Select either of the following options:
Use the CRL location provided in the certificate file.
Provide the location of a CRL file (
.crl
) in the local network.Do not use a CRL.
- Confirm the location of the certificate files you want to register on the appliance.
Before you use the Copilot feature on an appliance deployed with external certificates, ensure the following:
The appliance's certificate file (in
/etc/vxos-ssl/servers/certs/
) is same as the primary server's certificate file (in/usr/openv/var/global/appliance_certificates/
).The appliance's certificate file (in
/etc/vxos-ssl/servers/certs/
) is named in the<FQDN_hostname>-self.cert.pem
format.
Run the following commands on each of the associated appliances:
rm /etc/vxos-ssl/servers/certs/<FQDN_hostname>-self.cert.pem cp /etc/vxos-ssl/servers/certs/server.pem /etc/vxos-ssl/servers/certs/<FQDN_hostname>-self.cert.pem tpconfig -delete -nb_appliance <Short_hostname> /opt/NBUAppliance/scripts/copilot_users.pl --add