Page 1
™ EMC Unity Family ™ ™ EMC Unity All Flash, EMC Unity Hybrid, ™ EMC UnityVSA Version 4.0 Security Configuration Guide P/N 302-002-564 REV 03...
Page 2
COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA.
Storage system management interface access using IPv6......43 Configuring the management interface using DHCP........44 Running the Connection Utility............45 Protocol (SMB) encryption and signing............46 IP packet reflect..................48 IP multi-tenancy..................48 About VLANs................. 49 EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Additional resources As part of an effort to improve its product lines, EMC periodically releases revisions of its software and hardware. Therefore, some functions described in this document might not be supported by all versions of the software or hardware currently in use.
Page 6
Additional resources Note Presents information that is important, but not hazard-related. EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
CHAPTER 1 Introduction This chapter briefly describes a variety of security features implemented on the storage system. Topics include: Overview......................8 Related features and functionality information.............8 Introduction...
Service Commands Technical Notes Secure Remote Services Requirements and Configuration The complete set of EMC customer publications is available on the EMC Online Support website at http://Support.EMC.com. After logging in to the website, click the Support by Product page, to locate information for the specific feature required.
CHAPTER 2 Access Control This chapter describes a variety of access control features implemented on the storage system. Topics include: Alert settings...................... 10 Storage system factory default management and service accounts....11 Storage system account management..............11 Unisphere......................12 Unisphere command line interface (CLI).............14 Storage system service SSH interface...............
The Unisphere Online Help provides more information. EMC Secure Remote ESRS provides an IP-based connection that enables EMC Support to receive error files and alert Services (ESRS) messages from your storage system, and to perform remote troubleshooting resulting in a fast and efficient time to resolution.
Access Control Storage system factory default management and service accounts The storage system comes with factory default user account settings to use when initially accessing and configuring the storage system. See Table 3 on page 11. Table 3 Factory default user account settings Account type Username Password Privileges...
Session IDs are generated during authentication and used for the duration of each session Password usage Unisphere account usernames and passwords must meet these requirements, as shown in Table 5 on page 13. EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Page 13
Access Control Table 5 Unisphere account requirements Restriction Password requirement Minimum number of characters Minimum number of uppercase characters Minimum number of lowercase characters Minimum number of numeric characters Minimum number of special characters Supported special characters include: !,@#$%^*_~? Maximum number of characters Note You can change account passwords from Unisphere by selecting Settings and, under Users and Groups, select User Management...
Password usage Authentication to the Unisphere CLI is performed in accordance with management accounts created and managed through Unisphere. The same permissions that apply EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
On Windows 7, Windows 8, and Windows 10: C:\Users\${user_name} \AppData\Local\.emc\uemcli\cert On UNIX/Linux: <home_directory>/.emc/uemcli/cert Locate the files config.xml and config.key. If you uninstall Unisphere CLI, these directories and files are not deleted, giving you the option of retaining them. If these files are no longer needed, consider deleting them.
SP console of a storage system. This utility requires login credentials and an IP address to activate the console. For more information about the IPMItool, see the IPMItool User Guide Technical Notes . EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Access Control The SP Ethernet service port interface provides the same functions and features as the service SSH interface and is also subject to the same restrictions. The difference is that users access the interface through an Ethernet port connection rather than an SSH client.
Page 18
The VASA Provider fails, terminating the connection. When the VASA Provider starts up, it can respond to communication from the vCenter Server to reestablish the SSL connection and VASA session. EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Access Control A vCenter session is based on secure HTTPS communication between a vCenter Server and a VP. The VASA architecture uses SSL certificates and VASA session identifiers to support secure connections. With VASA 1.0, the vCenter Server added the VP certificate to its truststore as part of the VP installation, or when it created a VASA session connection.
2. The browser is redirected by the web server to a local Unisphere Central login URL and the user is presented with a login screen. 3. The user types and submits LDAP login credentials. The username is in the form <LDAP DOMAIN>/username. EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Access Control 4. A session token is set and the browser is redirected by the system back to the original URL that was specified. 5. The browser downloads the Unisphere content and Unisphere Central is instantiated. 6. The user then navigates through Unisphere to a particular storage system to monitor.
The following components are involved in user mapping: UNIX Directory Services EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Access Control Windows resolvers Secmap NTXMAP UNIX Directory Services UNIX Directory Services (UDSs) are used to determine the following for user mapping: Given a user identidier (UID), return the corresponding UNIX account name. Given a UNIX account name, return the corresponding UID and primary group identifier (GID).
Unix credential for access through NFS if the extended credential option is enabled. There is one cache instance for each NAS server. Granting access to unmapped users Multiprotocol requires the following: EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Page 25
Access Control A Windows user must be mapped to a UNIX user. A UNIX user must be mapped to a Windows user in order to build the Windows credential when the user is accessing a file system that has a Windows access policy.
KDC when joining/unjoining the SMB server. Note that the SMB server cannot be destroyed if NFS secure is configured to use the SMB configuration. If the administrator selects to use a UNIX based Kerberos realm, more configuration is needed: EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Access Control Realm name: The name of the Kerberos realm, which generally contains all upper- case letters. Entirely configure a UNIX KDC based Kerberos realm. To ensure that a client mounts an NFS export with a specific security, a security parameter, sec, is provided that indicates which minimal security is allowed.
Page 28
Add or remove custom recovery rules (to replace the default recovery rule). Control the verbosity of the logging produced by DAC for diagnostic purposes. For detailed information about the svc_dac command, refer to the EMC Unity Family Service Commands Technical Notes .
CHAPTER 3 Logging This chapter describes a variety of logging features implemented on the storage system. Topics include: Logging......................30 Remote logging options..................31 Logging...
There, you can use tools such as syslog to filter and analyze log results. The Logging on page 30 section provides more information. EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Logging Table 9 Logging features (continued) Feature Description Time synchronization Log time is recorded in GMT format and is maintained according to the storage system time (which may be synchronized to the local network time through an NTP server). Remote logging options The storage system supports logging user/audit messages to a remote host.
CHAPTER 4 Communication Security This chapter describes a variety of communication security features implemented on the storage system. Topics include: Port usage......................34 Storage system certificate................. 41 Storage system interfaces, services, and features that support Internet Protocol version 6......................42 Storage system management interface access using IPv6.........
IP addresses will not be assigned using DHCP. DHCP client Allows the storage system to act as a DHCP client during the initial configuration process and is used to EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Page 35
Communication Security Table 10 Storage system network ports (continued) Service Protocol Port Description receive messages from DHCP server to the client (storage system) to automatically obtain its management interface information. Also, used to configure DHCP for the management interface of a storage system which has already been deployed.
Page 36
(versions 2, 3, and 4) and is an important component of the SP to NAS Server interaction. NAS, VAAI-NAS 2049 Provides NAS datastores for VMware and is used for VAAI-NAS. If closed, EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Page 37
However, incoming requests over the external network are rejected. Background information on PAX is contained in the relevant EMC documentation on backups. There are several technical modules on this topic to deal with a variety of backup tools.
Page 38
(which are SID-based) are mapped to UNIX-based UID and GID values. Internal 60260 IWD initial configuration daemon. If closed, initialization of the array will be unavailable through the network. EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Communication Security Ports the storage system may contact The storage system functions as a network client in several circumstances, for example, in communicating with an LDAP server. In these instances, the storage system initiates communication and the network infrastructure will need to support these connections.
Page 40
Used to send Internet storage naming service (iSNS) registrations to the iSNS server. iSCSI 3260 Provides access to iSCSI services. If closed, file-based iSCSI services will be unavailable. EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Communication Security Table 11 Network connections that may be initiated by the storage system (continued) Service Protocol Port Description TCP/UDP 4000 Used to provide NFS statd services. statd is the NFS file- locking status monitor and works in conjunction with lockd to provide crash and recovery functions for NFS.
Table 12 IPv6 support by setting type and component (continued) Setting Type Component IPv6 Supported Unisphere alert setting SNMP trap destinations SMTP server EMC Secure Remote Support (ESRS) Storage server setting iSCSI server Shared Folder server Network Information Service (NIS) server (for NFS NAS...
The DNS server is an IP-based server that translates domain names into IP addresses. As opposed to numeric IP addresses, domain names are alphabetic and are usually EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Note If you use DHCP to assign IP addresses to any EMC Secure Remote Services (ESRS) components (ESRS Virtual Edition servers, Policy Manager, or managed devices), they must have static IP addresses. Leases for the IP addresses that EMC devices use cannot be set to expire.
Configuring SMB signing through GPOs affects all clients and servers within the domain and overrides individual Registry settings. Refer to Microsoft's security documentation for detailed information about enabling and configuring SMB signing. EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Page 47
Communication Security In SMB1, enabling signing significantly decreases performance, especially when going across a WAN. There is limited degradation in performance with SMB2 and SMB3 signing as compared to SMB1. The performance impact of signing will be greater when using faster networks. Configure SMB signing with GPOs Table 13 on page 47 explains the GPOs available for SMB1 signing.
IP addresses and port numbers. VLAN domain. Routing table. IP firewall. DNS server or other administrative servers to allow the tenant to have its own authentication and security validation. EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
Communication Security IP multi-tenancy is implemented by adding a tenant to the storage system, associating a set of VLANs with the tenant, and then creating one NAS server for each of the tenant's VLANs, as needed. It is recommended that you create a separate pool for the tenant and that you associate that pool with all of the tenant's NAS servers.
Page 50
SP has completed rebooting, reboot the other SP. The system will only operate fully in the configured FIPS 140-2 mode after both SPs have completed rebooting. EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
CHAPTER 5 Data Security Settings This chapter describes the security features that are available on the storage system for supported storage types. Topics include: About Data at Rest Encryption (physical deployments only)......52 Data security settings..................56 Data Security Settings...
A separate auditing function is provided for general key operations that track all key establishment, deletion, backup, and restore changes as well as SLIC addition. For additional information about the Data at Rest Encryption feature, refer to the EMC Unity: Data at Rest Encryption white paper.
For SAS Flash 2 drives, unmap is used to scrub the drives rather than zeroing. For more information about Data at Rest Encryption and the scrubbing process, refer to the EMC Unity: Data at Rest Encryption white paper located at EMC Online Support (https://support.emc.com).
Data Security Settings and rebuild begins. The DEK from the removed drive will be removed immediately from the keystore. A keystore modified status will be set by the Key Manager at this point and will trigger an alert to back up the keystore because DEK modifications were made to the keystore.
Key Distribution Center. Kerberos server that delivers Kerberos tickets to connect to Kerberos services. Backup and restore NDMP security can be implemented based on NDMP shared secrets. EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
CHAPTER 6 Security Maintenance This chapter describes a variety of security maintenance features implemented on the storage system. Topics include: Secure maintenance..................58 EMC Secure Remote Services for your storage system........59 Security Maintenance...
Process Description Downloading storage system software from License acquisition is performed from within the EMC Online Support website an authenticated session on the EMC Online Support website. EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
(register), modify, delete (unregister), and querying status capabilities that ESRS clients can use to register with the ESRS Gateway. For more information about ESRS Gateway and Policy Manager, go to the EMC Secure Remote Services product page on EMC Online Support (https:// support.emc.com).
CHAPTER 7 Security Alert Settings This chapter describes the different methods available to notify administrators of alerts that occur on the storage system. Topics include: Alert settings..................... 62 Configuring alert settings...................63 Security Alert Settings...
The Unisphere Online Help provides more information. EMC Secure Remote ESRS provides an IP-based connection that enables EMC Support to receive error files and alert Services (ESRS) messages from your storage system, and to perform remote troubleshooting resulting in a fast and efficient time to resolution.
Security Alert Settings Configuring alert settings You can configure storage system alert settings for email notifications and SNMP traps from the storage system. Configure alert settings for email notifications Using Unisphere: Procedure 1. Select Settings Alerts Email and SMTP. > >...
Page 64
Security Alert Settings Warning and above Notice and above Information and above EMC Unity All Flash, EMC Unity Hybrid, EMC UnityVSA 4.0 Security Configuration Guide...
CHAPTER 8 Other Security Settings This chapter contains other information that is relevant for ensuring the secure operation of the storage system. Topics include: Physical security controls (physical deployments only)........66 Antivirus protection................... 66 Other Security Settings...
The EE installer, which contains the CAVA installer, and the EE release notes are available at the EMC Online Support website under Support By Product for Unity Family, Unity VSA, Unity Hybrid, or Unity All Flash in Downloads Full Release.
Need help?
Do you have a question about the EMC Unity Family and is the answer not in the manual?
Questions and answers