Emc Vplex Geosynchrony: Security Configuration Guide
Emc Vplex Geosynchrony: Security Configuration Guide
GeoSynchrony
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners.
Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
Tables 5
Preface 7
1 Typographical conventions........................................................................................... 8
2 Quad-engine cluster director IP addresses................................................................. 24
3 Dual-engine cluster director IP addresses...................................................................25
4 Single-engine cluster director IP addresses................................................................25
5 Last Octets of Director IP Addresses......................................................................... 25
6 IPv6 support on VPLEX components.......................................................................... 27
7 VPLEX user accounts and privileges...........................................................................30
8 VPLEX operations and account types......................................................................... 32
9 Description of roles in Role-based Access Control......................................................37
10 Default password policies........................................................................................... 39
11 VPLEX component log files......................................................................................... 51
12 Port Usage................................................................................................................. 55
13 Communication in a VPLEX Metro system..................................................................57
14 Communication in a VPLEX Local system...................................................................59
As part of an effort to improve its product lines, EMC periodically releases revisions of
its software and hardware. Therefore, some functions described in this document
might not be supported by all versions of the software or hardware currently in use.
The product release notes provide the most up-to-date information on product
features.
Contact your EMC technical support professional if a product does not function
properly or does not function as described in this document.
Note
This document was accurate at publication time. Go to EMC Online Support (https://
support.emc.com) to ensure that you are using the latest version of this document.
Purpose
This document is part of the VPLEX documentation set, and describes the VPLEX
features and use cases, configuration options, VPLEX software and its upgrade, and
the hardware overview.
Audience
This guide is intended for use by customers who wish to understand the software and
hardware features of VPLEX, the use cases of VPLEX, product offerings, and the
configuration options.
Related documents (available on EMC Online Support) include:
l VPLEX Release Notes for GeoSynchrony Releases
l VPLEX Product Guide
l VPLEX Hardware Environment Setup Guide
l VPLEX Configuration Worksheet
l VPLEX Configuration Guide
l VPLEX Security Configuration Guide
l VPLEX CLI Reference Guide
l VPLEX Administration Guide
l Unisphere for VPLEX Help
l VPLEX Element Manager API Guide
l VPLEX Open-Source Licenses
l VPLEX GPL3 Open-Source Licenses
l Procedures provided through the SolVe Desktop
l EMC Host Connectivity Guides
l EMC VPLEX Hardware Installation Guide
l Various best practices technical notes available on EMC Online Support
Special notice conventions used in this document
EMC uses the following conventions for special notices:
Preface 7
Preface
DANGER
WARNING
CAUTION
NOTICE
Note
Typographical conventions
EMC uses the following type style conventions in this document:
https://support.emc.com
Technical support — Go to EMC Online Support and click Service Center. You will see
several options for contacting EMC Technical Support. Note that to open a service
request, you must have a valid support agreement. Contact your EMC sales
representative for details about obtaining a valid support agreement or with questions
about your account.
Online communities — Visit EMC Community Network at https://
community.EMC.com for peer contacts, conversations, and content on product
support and solutions. Interactively engage online with customers, partners, and
certified professionals for all EMC products.
Your comments
Your suggestions will help to improve the accuracy, organization, and overall quality of
the user publications. Send your opinions of this document to:
[email protected]
9
Preface
An EMC® VPLEX® cluster consists of one, two, or four engines (each containing two
directors), and a management server. A dual-engine or quad-engine cluster also
contains a pair of Fibre Channel switches for communication between directors.
Each engine is protected by a standby power supply (SPS), and each Fibre Channel
switch gets its power through an uninterruptible power supply (UPS). In a dual-engine
or quad-engine cluster, the management server also gets power from a UPS.
The management server has a public Ethernet port, which provides cluster
management services when connected to the customer network. The management
server can also provide call-home services through the public Ethernet port by
connecting to an EMC Secure Remote Support (ESRS) gateway deployed on the
same network. The ESRS gateway is also used by EMC personnel to provide remote
service.
Two VPLEX implementations are available:
l VPLEX Local (single cluster)
l VPLEX Metro (two clusters separated by synchronous distances)
In a VPLEX Metro implementation, the clusters are connected over IP between the
management servers.
VPLEX user authentication is configured locally on the management server or
remotely on an OpenLDAP or Active Directory server which integrates with Unix using
Service for UNIX 3.5, Identity Management for UNIX, or other authentication service.
A management server in each VPLEX cluster authenticates users against account
information kept on its local file system or against the LDAP/AD server. An
authenticated user can manage resources in the local cluster.
In a VPLEX Metro, users authenticated by either management server can manage all
resources in both clusters. Figure 1 shows a VPLEX cluster configuration (quad
system) example.
VPLEX overview 11
VPLEX overview
While the Security Configuration Guide must be reviewed in its entirety, this section
serves to highlight EMC's most important security recommendations to ensure the
security of your data and environment.
l Given the elevated permissions granted to the service account, its password must
be changed in order to better protect VPLEX from misuse or abuse of those
privileges. Changing the Service Account Password provides more information.
l To protect your data in the communications between clusters in VPLEX Metro
configuration, an external encryption solution such as IPSec must be used to
guarantee confidentiality and authentication for the IP WAN COM link.
Communication Security Settings provides more information.
l To protect the identity and integrity of your users and their account credentials, all
LDAP communication must be configured to use the LDAPS protocol.
Implementing LDAP provides more information.
Security recommendations 13
Security recommendations
The operating system (OS) of the VPLEX management server is based on Novell
SUSE Linux Enterprise Server. The management server in GeoSynchrony releases 5.3
to 5.5.2 and patches run SUSE Linux Enterprise Server 11 patch 3. Starting release
6.0, the management server, including MMCS-A and MMCS-B on VS6, runs SUSE
Linux Enterprise Server 11 Service Pack 4,
The operating system has been configured to meet EMC security standards by
disabling or removing unused services and packages, and protecting access to
network services through a firewall.
Used packages are hardened with security updates.
A VS2 management server has four Ethernet ports, identified as eth0 through eth3 by
the operating system, shown in the figure below. A 1 Gb/s public management port
(eth3) is the only Ethernet port in the VPLEX rack that may be connected to an
external management LAN. Other components in the rack are connected to two
redundant private management Ethernet networks, connected to the management
server's eth0 and eth2 ports. A service port (eth1) can be connected to a local laptop,
providing access to the same services as a host on the management LAN.
Figure 2 VS2 Management server, rear view
In a VS6 system, the management server module (MMCS-A and MMCS-B) is located
in the first engine on the cluster. All the remaining engines will have Akula
management modules for the management connectivity. MMCS A is the Management
interface to a public network and to the other VPLEX components in the cluster.
Customer network
connection
Engine 1
3x
0
0
0
1
DC DC
1
1
1
P
IB
AC AC
2
2
2
2
3
3
3
xxx-xxx-xxxx-xx xxx-xxx-xxxx-xx xxx-xxx-xxxx-xx
xxx-xxx-xxxx-xx xxx-xxx-xxxx-xx
3
3
2
2
2
2
AC AC
IB
P
1
1
1
DC DC
0
0
0
1
x3
https://management_server_public_IP_address
To access the GUI using an IPv6 address, use the following URL:
https://[mgmtserver_ipv6_addr]
For example:
https://[3ffe:80c0:22c:803c:215:17ff:fed3:207]/smsflex/
VPlexConsole.html
Note
Accessing the VPLEX GUI or the VPLEX CLI over IPv6 is possible only if the client
machine is also in an IPv6 network. The readonly user has no GUI access.
The GUI encrypts all traffic using a server certificate. Creating a host certificate
provides more information.
Note
The GUI has a timer that logs the user out after 10 minutes of inactivity. You can
modify the timeout value to a maximum of 12 hours.
Although you might have already secured the network connections between two
VPLEX Metro clusters, the management servers must establish an explicit VPN
connection, to acknowledge that the remote management server has full management
control over the local cluster and its resources.
The VPLEX management server uses strongSwan, an open source implementation of
IPsec for Linux.
Note
Files that are transferred with SCP into or out of the management server can be
viewed in the contexts /management-server/users/share/in and /
management-server/users/share/out respectively. All users see identical
output (independent of file ownership) under these in and out contexts. Only the
owner of the file (admin or service users) can delete a file.
For example, if user testuser1 (with no shell access) uses SCP to transfer a file
named a.txt into the management server, anyone logged into the management
server will see a.txt displayed in the /management-server/users/share/in
context. No one other than testuser1 (or admin or service) can delete a.txt from
the management server.
service and admin users are authorized to delete any existing file in the SCP sub-
directories, using the CLI rm command. Other users are only authorized to delete files
to which they have access. See the rm command in the EMC VPLEX CLI Reference
Guide for details.
To modify permissions for SCP file transfers to and from the management server, do
the following.
Procedure
1. Verify the attribute value for VPLEX local user testuser1 by listing the
management-server/users/local/testuser1 context. shell-access
should be set to false by default
VPlexcli:/management-server/users/local/testuser1> ls
Name Value
------------ ---------
role-name vplexuser
shell-access false
user-name testuser1
2. Run the following examples to test SCP file transfers for restricted shell user
testuser1.
a. Transfer files from a remote server and verify the file transfer was
successful by listing the management server SCP in context.
VPlexcli:/> ll /management-server/share/in/
Name
---------------
logfile
loginbanner.txt
monitor.xml
b. Transfer files from the management server to an external host and verify the
result in the management server. The file should be present in shell
location /diag/share/out/. This path equates to /
managementserver/share/out/ in the CLI.
VPlexcli:/> ll /management-server/share/out/
Name
--------
testfile
Use SCP to transfer a file from the management server to an external host.
The file is present in location /tmp/
After the command fails, display the log file to verify the cause of failure.
d. Delete a.txt from the SCP share/in context using the rm command.
VPlexcli:/management-server/share/in> ls
a.txt b.txt
VPlexcli:/management-server/share/in> rm a.txt
VPlexcli:/management-server/share/in> ls
b.txt
and local port 5901, and then connect a VNC viewer to local port 5901. Popular VNC
clients are RealVNC and TightVNC.
To establish a tunnel, you must log in with your standard SSH credentials. After a
successful login, the SSH client program must remain running, to allow the SSH tunnel
to remain operational.
Follow these steps to establish a tunneled VNC connection using PuTTY:
Procedure
1. Launch PuTTY.exe, and configure the PuTTY window as shown in the figure
below:
l Server address — Public IP address of the VPLEX management server.
l Session name — Type a name for the PuTTY session you are configuring.
This allows you to load the saved session if you need to reconnect later,
eliminating the need to configure the individual parameters again.
l Default settings — Verify, and set as shown if necessary.
Figure 5 PuTTY configuration window
Note
The management server supports the coexistence of both the IPv6 and IPv4 address.
However, the directors only support IPv4 addresses.
MMCS IP Addresses
This table lists the IP addresses of the MMCS modules on engine-1 of VPLEX VS6
systems.
IP Addresses
Cable Director IP Address
Cable From To If cable is in Cluster 1 If cable is in Cluster 2
ID in
Figure
A1 MMCS-A Management A Eng-2 MM-A LAN Service Director-1-1-A, subnet B Director-2-1-A, subnet B
Fabric connector port 128.221.253.35 128.221.253.67
A2 Eng-2 MM-A LAN Eng-3 MM-A LAN Service Director-1-2-A, subnet B Director-2-2-A, subnet B
Management port port 128.221.253.37 128.221.253.69
25
IP addresses and component IDs
B2 Eng-2 MM-B LAN Eng-3 MM-B LAN Service Director-1-2-B, subnet A Director-2-2-B, subnet A
Management port port 128.221.252.38 128.221.252.70
B3 Eng-3 MM-B LAN Eng-4 MM-B LAN Service Director-1-3-B, subnet A Director-2-3-B, subnet A
Management port port 128.221.252.40 128.221.252.72
In VPLEX, an IP address can either be an IPv4 address and/or an IPv6 address. While
VPLEX continues to support IPv4, it now also provides support for the full IPv6 stack
as well as dual stack IPv4/IPv6, including:
l Browser session
l VPN connection
Note
In a virtual private network, the end points must always be of the same address family.
That is, each leg in the VPN connection must either be IPv4 or IPv6.
l WAN link ports
l CLI session
l Cluster Witness
l Recover Point
In Release 5.3, IPv6 is available only with new installations.
The transition from an IPv4 network to a network where IPv4 and IPv6 coexist is
challenging because the two protocols are not designed to be interoperable with each
other. Transition technologies such as tunneling, or other translator gateways are
required to exchange traffic between the two types of network.
The VPLEX management server uses the dual stack mechanism to deploy IPv6. This
mechanism provides complete support for both IPv4 and IPv6, and allows applications
to talk to both IPv4 and IPv6. However, the choice of IP version is based on the name
look up and application preference.
The following table describes IPv6 support on VPLEX components along with
additional notes.
Implementing IPv6 27
Implementing IPv6
Cluster Witness Yes Yes Yes IPv6 address for a cluster witness can be
specified using the Vcenter or the
VMware console -> Configure Network
Recover Point Yes Yes Yes RecoverPoint can communicate with the
management server using either an IPv4
address or an IPv6 address.
LDAP/AD server Yes Yes Yes The IP address can be specified during
the LDAP configuration. To change the
configured IP address, the configuration
must be recreated.
(3) The first user who attempts to log in as admin is prompted to change the admin
password before logging in. To change the password when prompted, follow the steps
in Changing Passwords. Follow all instructions except for changing the password after
you log in.
(4) Fibre Channel COM switches exist only in dual-engine and quad-engine VPLEX
clusters.
(5) In switches that are shipped for field replacement or hardware upgrade (rather
than as part of a cabinet system), there is no service account.
The table provides an overview of specific operations that each account type can
perform on a VPLEX component.
Note
The root privileges for performing maintenance activities on Cluster Witness are
restricted to the Service account.
VPLEX customers can choose to configure their user accounts using either:
l An external OpenLDAP or Active Directory server which integrates with Unix using
Service for UNIX 3.5, Identity Management for UNIX, or other authentication
service.
OpenLDAP and Active Directory users are authenticated by the server. Usernames
and passwords created on an external server are fetched from the remote system
to the VPLEX system each time they are used.
l The VPLEX management server
Usernames and passwords are created locally on VPLEX system, and are stored on
VPLEX.
Customers who do not want to use an external LDAP server for maintaining user
accounts create their user accounts on the VPLEX system itself.
VPLEX is pre-configured with two default user accounts: admin and service.
Refer to the EMC VPLEX CLI Command Reference Guide for information on the
commands used to configure user authentication.
Note
In order to issue shell commands, you must either be logged in as admin and service
or have shell access explicitly granted by the Administrator. Refer to the EMC VPLEX
Security Configuration Guide for instructions on using the CLI to define accounts for
shell access.
Note
If you do not have shell access, you can only access a single directory when uploading
and downloading files.
Role descriptions
This topic describes roles supported under role-based access.
Shell access is turned off by default for all new VPLEX accounts. Roles are defined as
follows:
Current admin and service users continue to have shell access. It is possible for the
Administrator to turn shell access to service on or off per account basis as described
in this document.
John is an existing EMC customer. He is defined as admin and has always had
Administrator privileges and shell access. For VPLEX release 6.0, John sees no change
in behavior and does not need to grant himself shell access (using role-based access
control) when upgrading to VPLEX release 6.0. John will, however, need to grant
himself explicit shell access in future major releases.
Pete is a new EMC VPLEX customer performing a Greenfield install (no NDU). Pete
plans to login as either the admin or as the service user. admin and service users
have shell access by default in VPLEX release 6.0 so Pete does not need to perform
any tasks in order to execute shell commands.
Example 3 Existing VPLEX customer NDUs to VPLEX release 6.0 and adds new user
Mary is a VPLEX customer. She NDUs to VPLEX release 6.0. After the NDU, Mary
finds she needs to grant shell access to a new user, Paul. Mary must use role-based
access control to define Paul as a User with shell access, even though she doesn't
have to explicitly define shell access for herself until the next major release.
Susan is a VPLEX customer. She NDUs to VPLEX release 6.0. Susan has many scripts
that she runs which access the shell, running under her admin account (which had
shell access). Again, she will not have to explicitly grant shell access with role-based
access control for VPLEX release 6.0, but she will for the next major release.
Implementing LDAP
Starting in Release 5.2 and later, LDAP configuration is securely persisted using an
internal security component. This eliminates bind user credential vulnerabilities. The
new implementation of LDAP includes the following:
l Use a new internal security component that ensures information is securely
persisted.
l Support for Directory Server groups, a logical collection of users. Groups can be
specified using the configuration commands and can be added or removed using
the map and unmap commands.
Note
For upgraded systems or systems that have not previously had LDAP configured,
existing configuration information or the way it is persisted is not automatically
modified. Authentications continue as they were prior to upgrade. However, users can
continue to be mapped or unmapped with the old configuration.
Note
The VPLEX CLI Guide provides information on the commands used to configure LDAP.
Password policy
Details password policies and default values
The VPLEX management server uses a Pluggable Authentication Module (PAM)
infrastructure to enforce minimum password quality. It uses pam_cracklib, a library
that checks for dictionary words, to check potential passwords.
Password inactive The number of days after a password has expired before 1
days the account is locked.
In Release 5.2 and later, the management server uses the default value for the
password policies listed in the Default password policies table, and you can configure
each password policy to meet your specific needs. The new value will be updated in
the appropriate configuration file, and existing users will be updated with the new
Password policy 39
Configuring user authentication
configuration. Refer to the VPLEX CLI Command Reference Guide for information on
the commands used to set password policies and the values allowed.
Note the following:
l Password policies do not apply to users configured using the LDAP server.
l The Password inactive days policy does not apply to the admin account to protect
the admin user from account lockouts.
l During the management server software upgrade, an existing user’s password is
not changed−− only the user’s password age information changes.
l You must be an admin user to configure a password policy.
Note
VS6 systems support only the GeoSynchrony version 6.0 and later.
Note
VS6 systems support only the GeoSynchrony version 6.0 and later.
l After upgrading to 5.5 from 5.2 or earlier, 5.3 or 5.4, if you did not change the
default service password, you must do so within 30 days. A message displays to
remind you that the default service password will expire in 30 days.
l After upgrading to 6.0.x from 5.5.x or earlier, if you did not change the default
service password, you must do so within 30 days. During an NDU, every upgrade
path does not revisit the password policy and the password settings of the service
account. So, an upgrade path can miss noticing the use of the default service
account password. Within the 6.0.x versions, setting the service account
password back to the default one can cause an upgrade path to notice the default
password and the password can be forced to expire in 30 days, if it was not caught
in the previous upgrade paths.
l When installing VPLEX 5.5 on a new system, follow these prompts to change the
default service password.
Similar steps to change default service password are executed, after the upgrade
from VPLEX 5.2/5.4/5.5 to VPLEX 5.5. These are not encountered if the default
service password has already been changed prior to VPLEX 5.5 upgrade.
Valid password characters
The following characters are allowed in a VPLEXcli password:
l A-Z
l a-z
l 0-9
l . ? / * @ ^ % # + = - _ ~ : space
Note the following rules:
l A space is allowed only between the characters in a password, not in the beginning
or the end of the password.
l The # cannot be used in the beginning of a password.
l The passphrase used during the VPN configuration can contain letters, numbers,
and special characters.
Cluster Witness passwords
When upgrading to VPLEX 6.0, the Cluster Witness default password is automatically
changed, for security reasons, to a random value, which can be displayed by the
Administrator.
The Administrator can change the password to a specific value by running the
configuration cw-change-password command. See the VPLEX CLI Command
Reference Guide for more information.
Cluster Witness passwords allow additional characters:
l !
l $
l &
l (
l )
l [
l ]
----------
Password policy 41
Configuring user authentication
currently):
Re-enter password:
----------
Re-enter password:
----------
Re-enter password:
Re-enter password:
----------
Re-enter password:
Note
The new user must change the password the first time he or she logs in.
List the management-server/users context to view both LDAP and Local users.
For example:
VPlexcli:/management-server/users> ll
l ldap context - The ldap context displays the role-name and the shell-
access associated with an LDAP user. All LDAP users are given identical
privileges and every LDAP user is treated the same.
Attributes associated with an ldap user account are:
n role-name - Name of the role with which the user account is associated
n shell-access - Defines the user's shell access privileges.
In this example, the role-name vplexuser has shell access as an LDAP user:
VPlexcli:/management-server/users/ldap> ll
Name Value
role-name vplexuser
shell-access true
l local context - The local context displays the role-name and the shell-
access associated for a user with local access. By default, admin and service are
local users. In addition, any user in the system created by admin are local users.
Attributes associated with a local user account are:
n user-name - Name of the user
n role-name - Name of the role with which the user account is associated
n shell-access - Defines the user's shell access privileges.
In this example, the admin user is defined with role securityadmin and shell-
access disabled.
VPlexcli:/management-server/users/local/admin> ll
Name Value
role-name securityadmin
shell-access false
user-name admin
VPlexcli:/management-server/users/local/testuser> ll
role-name : user
shell-access : false
user-name : testuser
3. To revoke or restrict shell access for testuser, use the set command.
a. Set shell-access to true as follows: set shell-access false.
b. Enter the administrator password.
c. Verify that the attributes of the user (testuser in this example) have been
successfully modified by navigating to the appropriate context and running
the ll command. If shell-access was granted, the following output is
displayed.
VPlexcli:/management-server/users/local/testuser> ll
role-name : user
shell-access : false
user-name : testuser
Note
Changing passwords
Any user can change his/her own password as follows:
Procedure
1. Launch PuTTY (or a similar SSH client), and establish a connection to the public
IP address of the VPLEX management server.
2. Log in with the applicable username.
3. From the Linux shell prompt, type this command to connect to the VPlexcli:
vplexcli
4. Log in with username admin.
Resetting passwords
A user with an admin account can reset passwords for other users as follows:
Procedure
1. Launch PuTTY (or a similar SSH client), and establish a connection to the public
IP address of the VPLEX management server.
2. Log in with username admin.
3. From the Linux shell prompt, type this command to connect to the VPlexcli:
vplexcli
4. Log in with username admin.
5. From the VPlexcli prompt, type the following command:
Note
The user must change the password the next time he or she logs in.
Resetting passwords 49
Manage user accounts
Component Location
Unisphere for VPLEX /var/log/VPlex/cli/
session.log_username
ConnectEMC /var/log/ConnectEMC/logs/
ConnectEMC.log files
Firewall /var/log/firewall
IP WAN COM
A VPLEX Metro system does not support native encryption over an IP WANCOM link.
EMC recommends that you deploy an external encryption solution such as IPSec to
achieve data confidentiality and end point authentication over IP WAN COM links
between clusters.
Accessibility
To establish secure communication, note the following:
l The following protocols must be allowed on the customer firewall (both in the
outbound and inbound filters):
# Encapsulating Security Payload (ESP): IP protocol number 50
# Authentication Header (AH): IP protocol number 51
l The following ports must be allowed on the customer firewall:
# Internet Key Exchange (IKE): UDP port 500
# NAT Traversal in the IKE (IPsec NAT-T): UDP port 4500
# Secure Shell (SSH): TCP port 22
l Static IP addresses must be assigned to the public ports on each management
server (eth3) and the public port in the Cluster Witness Server. If these IP
addresses are in different subnets, the IP management network must be able to
route packets between all such subnets.
l The firewall configuration settings in the IP management network must not
prevent the creation of IPsec tunnels. Cluster Witness traffic as well as VPLEX
management traffic leverages VPN tunnels established on top of IPsec.
l IP management network must be capable of transferring SSH traffic between
management servers and Cluster Witness Server.
l IP management network must be capable of transferring ICMP traffic between
management servers and Cluster Witness Server in order to enable configuration,
upgrade, and diagnostics of Cluster Witness.
l The required minimum value for Maximum Transmission Unit (MTU) is 1500 bytes.
Configure MTU as 1500 or larger.
Note
The IP management network must not be able to route to the following reserved
VPLEX subnets: 128.221.252.0/24, 128.221.253.0/24, and 128.221.254.0/24.
If VPLEX is deployed with IP inter-cluster network, the inter-cluster network must not
be able to route to the following reserved VPLEX subnets: 128.221.252.0/24,
128.221.253.0/24, and 128.221.254.0/24.
Port Usage
The following table lists all the network ports and services used by VPLEX
components. This information, along with the firewall settings is needed to use the
product.
5 Public port
TCP/5400
to 5413
10 Public port
UDP/161
Port Usage 55
Communication Security Settings
CAUTION
For VPLEX Performance Monitor, ensure that Port 443 is open on the firewall
between VPLEX Performance Monitor and VPLEX. Refer to the Knowledge Base
article 474842 for more information on configuring the firewall policy for VPLEX
IP WAN-COM communications over filter based firewall.
Notes
(1) ICMP/Ping is required between the management server (cluster 1) and external
NTP.
This table describes the possible communication between the VPLEX components in a
VPLEX Metro system.
3 Yes Yes
4 Yes Yes
5 Yes Yes
8 Yes
9 Yes Yes
10 Yes Yes
11 Yes Yes
12 Yes Yes
13 Yes Yes
14 Yes Yes
15 Yes Yes
Legend:
l A - VPLEX Management Client
l B - Management Server 1
l C - Management Server 2
l D - VPLEX Cluster Witness
l E - ESRS Server
This table describes the possible communication between the VPLEX components in a
VPLEX Local system.
2 Yes
3 Yes
4 Yes
5 Yes
9 Yes
10 Yes
11 Yes
12 Yes
13 Yes
14 Yes
15
Legend:
l A - VPLEX Management Client
l B - Management Server 1
l C - ESRS Server
Network Encryption
The VPLEX management server supports SSH through the sshd daemon provided by
the FIPS compliant OpenSSH package. It supports version 2 of the SSH protocol.
When the management server starts for the first time, the sshd daemon
generateskey-pairs (private and public key) for communication with SSH clients.
rsa, dsa and ecdsa key-pairs are generated to support communication with SSH
version 2 clients.
The HTTPS protocol and the IPsec VPN use a X.509 host certificate to identify the
server and encrypt all traffic. X.509 host certificates use a 2048 bit host key. During
initial setup of a VPLEX cluster, a local Certification Authority (which signs the host
certificate request) is created automatically.
VPLEX supports a corporate Certification Authority signing the host certificate
requests. Users can import the corporate Certificate Authority signed CA, host
certificate and key file. The IPSec encryption can use RSA or ECDSA cryptography
generated key-pair certificates. You can use only one type (RSA or ECDSA) in
configuring VPN in all the three components of VPLEX, for example, the two
management servers and the cluster witness server. Note that for a VPLEX Metro
configuration, the host certificates for both web and VPN to be imported on both
clusters should be signed and created using the same CA certificate.
To import the corporate Certificate Authority signed certificates, refer to the VPLEX
CLI Guide.
Note
Host certificates are created as a part of EZsetup during a first time installation.
Finding the host certificates's SHA256, SHA1 and (for GUI users) MD5
fingerprints
To find the host certificate's SHA1 and (for GUI users) MD5 fingerprints, do the
following.
Procedure
1. Type the following command:
Finding the host certificates's SHA256, SHA1 and (for GUI users) MD5 fingerprints 61
Communication Security Settings
Output example:
SHA256 Fingerprint=91:65:4C:02:80:C0:C8:54:24:4A:
71:2B:BF:C1:D5:3C:08:A2:2B:36:BC:7B:3D:A2:B3:8A:
72:83:66:E1:36:25
Output example:
SHA1 Fingerprint=2E:B0:DD:
59:DD:C3:29:96:33:74:19:CC:A0:81:28:28:6F:4F:76:E4
Output example:
MD5 Fingerprint=6E:2C:A5:8E:86:11:45:26:02:09:62:97:6F:18:FD:
62
Output example:
1024 52:42:70:0c:22:aa:2f:e3:09:18:93:c8:20:a4:78:0c
ssh_host_dsa_key.pub
Output example:
1024 a4:d8:64:d0:24:b9:2c:3d:06:24:5f:3a:30:ba:83:f8
ssh_host_rsa_key.pub
Output example:
256 ca:05:f3:9a:3e:51:fe:53:51:90:39:bf:6b:f5:78:56
[MD5]root@ManagementServer (ECDSA)
Note
Note
After entering the CLI command, restart the Web server with the webserver
restart command to apply the changes.
$6$<salt>$<encrypted>