Summary of Contents for Gemalto SafeNet ProtectServer
Page 1
SafeNet ProtectServer Network HSM Installation and Configuration Guide...
Page 2
Gemalto does not and shall not warrant that this product will be resistant to all possible attacks and shall not incur, and disclaims, any liability in this respect.
Chapter 1 Introduction This Guide is provided as an instructional aid for the installation and configuration of a SafeNet ProtectServer Network HSM cryptographic services hardware security module (HSM). Chapter 2 gives an overview of the product. Both functionality and physical characteristics are described.
(API) software, to implement cryptographic service providers for a wide range of secure applications. The SafeNet ProtectServer Network HSM is PC based. The enclosure is a heavy duty steel case and common PC ports and controls are provided. The unit is delivered with the necessary software components pre-installed on a Linux operating system, in a “ready to operate”...
Figure 1: SafeNet ProtectServer Network HSM front panel Ports The front panel is equipped with the following ports: Used to connect a VGA monitor to the appliance. Console Used to provide console access to the appliance. See "Equipment requirements" on page 9.
HSM to be deleted. Once the keys are deleted they are not recoverable. Ensure that you always back up your keys. To avoid accidentally deleting the keys on an operational SafeNet ProtectServer Network HSM, remove the tamper key after installation/commissioning and store it in a safe place.
In network mode, Network HSM Access Provider software is installed on the same machine used to host the cryptographic API software. It is used to implement the connection between and the SafeNet ProtectServer Network HSM and the cryptographic host using a TCP/IP network connection. The SafeNet ProtectServer Network HSM can then be located at any distance from the machine hosting the access provider, cryptographic API and application software.
Implementation steps The installation and configuration of the SafeNet ProtectServer Network HSM is part of the setup of the overall network operating mode. The following is a summary (with references to the location of detail) of the steps to setup a cryptographic service provider, using the network operating mode and a SafeNet ProtectServer Network HSM: 1.
IPv6 address on each interface. If you intend to use both NICs, connect Ethernet cables to both LAN connectors. 3. Connect the power cable to the unit and a suitable power source. The SafeNet ProtectServer Network HSM is equipped with an autosensing power supply that can accept 100-240V at 50- 60Hz.
Page 14
The options are: Connect a PS/2-to-USB adapter cable (pink) between the card reader and a USB port on the SafeNet ProtectServer Network HSM. If you prefer to not expose USB ports on your crypto server (for security reasons), then connect a PS/2-to-USB adapter cable between the card reader and a standalone powered USB hub.
Refer to the indicated sections for more detail if required. 1. Connect a keyboard/monitor or serial cable to the SafeNet ProtectServer Network HSM In order to access the SafeNet ProtectServer Network HSM console, you must do one of the following:...
Page 16
ProtectServer Network HSM login: prompt is displayed. 3. Login to the console Following boot up, the SafeNet ProtectServer Network HSM will prompt for login credentials. If you are using a monitor/keyboard, you can log in as pseoperator, admin or root. If you are using a serial connection, you can log in as pseoperator or admin.
This utility displays the current status of the SafeNet ProtectServer Network HSM. It provides the following information: the status of the HSM installed in the SafeNet ProtectServer Network HSM. If the unit is functioning correctly, a message that includes the following is...
Note: It is recommended that you use psesh:>network config interface to configure the IPv4 IP address. The SafeNet ProtectServer Network HSM is equipped with two NICs (eth0 and eth1), each of which can be configured with its own IP address(es). The IP address for each...
Set the default gateway (that this SafeNet ProtectServer Network HSM should use) by /etc/sysconfig/network editing the file If you ever want to address the unit by its name using the loopback connection, you can set the hostname by editing the...
After you have completed the network configuration, you can access the SafeNet ProtectServer Network HSM over the network using the SSH protocol. To access the SafeNet ProtectServer Network HSM using SSH, you require an SSH client such as puTTY (available for free from www.putty.org).
Troubleshooting Each SafeNet ProtectServer Network HSM is tested during manufacture to ensure a high level of quality. In the unlikely event the unit is not functioning correctly please re-check the installation procedure, paying particular attention to the power source and network cable connection.
About PSESH The PSESH shell command line tool provides access to the SafeNet ProtectServer Network HSM shell for performing basic appliance configuration tasks such as network configuration and appliance software package updates and management.
You can now issue any PSESH command. For a summary, type "?" or "help" and press Enter. Command Reference This section describes the commands available in the SafeNet ProtectServer Network HSM command shell (psesh). The commands are described in alphabetical order and provide: ...
Display the current state of the HSM, or reset the HSM if it becomes unresponsive. network View or configure the network settings for the SafeNet ProtectServer Network HSM appliance. package Manage the software packages installed the appliance. service Manage the services on the appliance.
Delete all of the files in the appliance’s SCP clear directory. Delete the specified file from the appliance’s delfile <filename> d <filename> SCP directory. show List all of the files that currently reside in the appliance’s SCP directory. Example psesh:> files show SCP Folder Content ------------------ total 861K...
Type "help" or "?" (without the double quotation marks) to see help and syntax information for any Luna Shell command. "help" or "?" with no arguments lists the top level commands with brief descriptions. "help" or "?" followed by one or more arguments (command names, sub- commands, options) yields increasingly detailed information.
Syntax network dns [add | delete] [nameserver <dns_name_server> | searchdomain <dns_search_domain>] Parameter Shortcut Description add nameserver Add a DNS name server to the list of servers <dns_name_server> used to provide DNS services to the appliance. Add a DNS search domain to the list of search add searchdomain <dns_search_domain>...
Configure the iptables firewall for the appliance. You can use this command to configure the iptables ACCEPT and DROP rules. By default, the SafeNet ProtectServer Network HSM allows access to all networks and hosts. The default policy for the INPUT and OUTPUT chain is set to ACCEPT.
Syntax network iptables addrule {accept | drop} {host –ip <ip_address> | network –net <ip_address> -mask <network_mask>} Parameter Shortcut Description accept Add a host or network ACCEPT rule to the iptable for the appliance. Add a host or network DROP rule to the iptable drop for the appliance.
package Manage the software packages installed the appliance. User access admin Syntax package {list [all | ptk] | update} Parameter Shortcut Description List the packages currently installed on the list [all | ptk] appliance. Use the all flag to list all packages. Use the ptk flag to list the PTK packages only.
Page 33
restart <service> Restart the specified service. Services require restarting if their configurations have changed. For example, after changing any network settings using the network commands, you should restart the network service to ensure the new settings take effect. Restarting a service isn't always the same as stopping and then starting a service.
Command Result : 0 (Success) psesh:>service restart network Shutting down interface eth0: Shutting down interface eth1: Shutting down loopback interface: Bringing up loopback interface: Bringing up interface eth0: Bringing up interface eth1: Command Result : 0 (Success) psesh:>service status network eth0 is up Command Result : 0 (Success) status...
Page 35
netstat Display the current network connections. Display the status of all active processes. time Display the time currently configured on the appliance, using the 24 hour clock. zone Display the currently configured time zone. Example psesh:>status cpu CPU Load Averages: 0.14 0.10 0.08 1/68 11162 System uptime: At Tue Jan 26 06:35:23 EST 2016, I am up 4 days and 23:38 hours.
Page 36
psesh:>status mac eth0 00:0D:48:3B:5E:E4 Command Result : 0 (Success) psesh:>status mem total used free shared buffers cached Mem: 1019668 167744 851924 35332 67256 -/+ buffers/cache: 65156 954512 Swap: Command Result : 0 (Success) psesh:>status netstat Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State...
sysconf Configure the appliance time, date, or SNMP settings, or reboot or power-off the appliance. User access admin, pseoperator Syntax sysconf {appliance | snmp | time | timezone} Parameter Shortcut Description Reboot or power-off the appliance. See “sysconf appliance appliance”, below. Configure the SNMP settings on the appliance.
SNMP is stopped Command Result : 0 (Success) psesh:>sysconf snmp show SNMP is not running SNMP is disabled Current SNMP configuration ##################################################################### SafeNet ProtectServer SNMP v2c snmpd.conf ##################################################################### agentuser root syslocation TESTLAB syscontact TESTCONTACT com2sec secName 192.168.11.17 COMMUNITY group secNameGroup v2c secName view systemview included .1.3.6.1.2.1.1...
-community -com Specifies the community string for the SNMP server on the appliance. SNMP community strings function as passwords that are embedded in every SNMP packet to authenticate access to the Management Information Base (MIB) on the appliance. Enter this keyword followed by the community string.
Timezone set to America/Toronto psesh:> sysconf timezone show syslog Display or archive the syslog. User access admin, pseoperator Syntax syslog {tail | tarlogs} Parameter Shortcut Description tail Display the last entries of the specified syslog. See “syslog tail”, below. tarlogs Create an archive of the syslog Example psesh:>syslog tar...
Example psesh:>syslog tail -logname messages -entries 10 Feb 12 12:00:17 PSe-II snmpd[3963]: Connection from UDP: [172.16.21.19]:62386->[172.20.11.150] Feb 12 12:00:18 PSe-II snmpd[3963]: Connection from UDP: [172.16.21.19]:62386->[172.20.11.150] Feb 12 12:04:16 PSe-II psesh [4341]: info : 0 : pssh user login : admin : 172.16.181.182/51177 Feb 12 12:04:28 PSe-II psesh [4341]: info : 0 : Command: help syslog : admin : 172.16.181.182/51177 Feb 12 12:06:36 PSe-II psesh [4341]: info : 0 : Command: help syslog...
Page 42
Retype new password: passwd: all authentication tokens updated successfully. Command Result : 0 (Success) [PSe-II] psesh:>user password Changing password for user admin. New password: BAD PASSWORD: it is based on a dictionary word Retype new password: passwd: all authentication tokens updated successfully. Command Result : 0 (Success) psesh:>user password –user pseoperator Changing password for user pseoperator.
Appendix A Technical specifications The SafeNet ProtectServer Network HSM specifications are as follows: Hardware One smart card reader secure USB port (requires the included USB-to-serial cable) Protective, heavy duty steel, industrial PC case ATOM D425 CPU 1 Gb RAM ...
Need help?
Do you have a question about the SafeNet ProtectServer and is the answer not in the manual?
Questions and answers