Veritas NetBackup™ Appliance Security Guide
- About the NetBackup appliance Security Guide
- User authentication
- About user authentication on the NetBackup appliance
- About configuring user authentication
- About user name and password specifications
- User authorization
- Intrusion prevention and intrusion detection systems
- Log files
- Operating system security
- Data security
- Web security
- Network security
- Call Home security
- Remote Management Module (RMM) security
- STIG and FIPS conformance
- Appendix A. Security release content
About the NetBackup appliance Security Guide
NetBackup appliances are developed from their inception with security as a primary need. Each element of the appliance, including its Linux operating system and the core NetBackup application, is tested for vulnerabilities using both industry standards and advanced security products. These measures ensure that exposure to unauthorized access and resulting data loss or theft is minimized.
Each new version of NetBackup appliance software and hardware is verified for vulnerabilities before release. Depending on the severity of issues found, Veritas releases a security patch or provides a fix in a scheduled major or maintenance release. To reduce the risk of threats, Veritas regularly updates the third-party packages and modules in the product as part of regular maintenance release cycles.
The goal of this guide is to describe the security features implemented in NetBackup appliance 4.0 and includes the following chapters and sub-sections:
This chapter talks about the authentication features of the NetBackup appliance and includes the following sections:
Table: Sections featuring authentication
Section name | Description | Link |
---|---|---|
About user authentication on the NetBackup appliance | This section describes the types of users, user accounts, and processes allowed to access the appliance. | |
About configuring user authentication | This section describes the configuration options for the various types of users that can authenticate on the appliance. | |
About authenticating LDAP users | This section describes the prerequisites and process to configure the appliance to register and authenticate LDAP users. | |
About authenticating Active Directory users | This section describes the prerequisites and process to configure the appliance to register and authenticate Active Directory (AD) users. | |
About authenticating Kerberos-NIS users | This section describes the prerequisites and process to configure the appliance to register and authenticate Kerberos-NIS users. | |
About the appliance login banner | This section describes the login banner feature where you can set a text banner to appear when a user tries to authenticate on the appliance. | |
About user name and password specifications | This section describes the user name and password credentials. |
This chapter describes the features that are implemented for authorizing users accessing the NetBackup appliance and includes the following sections:
Table: Sections on authorization
Section name | Description | Link |
---|---|---|
About user authorization on the NetBackup appliance | This section describes the key characteristics of the authorization process of the NetBackup appliance. | |
About authorizing NetBackup appliance users | This section describes the administrative options for authorizing appliance users with various access permissions. | |
About the Administrator user role | This section describes the Administrator user role. | |
About the NetBackupCLI user role | This section describes the NetBackupCLI user role. |
This chapter describes the Symantec Data Center Security: Server Advanced (SDCS) implementation for the NetBackup appliance using the following sections:
Table: Sections on IPS and IDS policies
Section name | Description | Link |
---|---|---|
About Symantec Data Center Security on the NetBackup appliance | This section introduces the SDCS feature implemented with the appliances. | See About Symantec Data Center Security on the NetBackup appliance. |
About the NetBackup appliance intrusion prevention system | This section describes the IPS policy that is used to protect the appliances. | See About the NetBackup appliance intrusion prevention system. |
About the NetBackup appliance intrusion detection system | This section describes the IDS policy that is used to monitor the appliances. | See About the NetBackup appliance intrusion detection system. |
Reviewing SDCS events on the NetBackup appliance | This section describes the SDCS events based on their level of security. | |
Running SDCS in unmanaged mode on the NetBackup appliance | This section briefly describes the default security management on the appliance. | See Running SDCS in unmanaged mode on the NetBackup appliance. |
Running SDCS in managed mode on the NetBackup appliance | This section describes how you can manage appliance security as part of a centralized SDCS environment. | See Running SDCS in managed mode on the NetBackup appliance. |
This chapter lists the NetBackup appliance log files and the options to view the log files, using the following sections:
Table: Working log sections
Section name | Description | Link |
---|---|---|
About working with log files | This chapter provides an overview on all the different types of logs that you can view for the NetBackup appliance. | |
Viewing log files using the Support command | This chapter describes the procedure to view log files using the support command. | |
Locating NetBackup Appliance log files using the Browse command | This chapter describes the usage of Browse command to view log files. | See Where to find NetBackup appliance log files using the Browse command. |
Gathering device logs with the DataCollect command | This chapter describes the procedure to gather device logs. |
Table: Operating system sections
Section name | Description | Link |
---|---|---|
About NetBackup appliance operating system security | This section describes the different update types that are made to the operating system to improve the security of the overall NetBackup appliance. | |
Major components of the NetBackup appliance OS | This section lists the products and operating system components of the NetBackup appliance. | |
Vulnerability scanning of the NetBackup appliance | This section lists some of the security scanners that Veritas uses to verify the security of the appliance. |
This chapter describes the data security implementation for the NetBackup appliance, using the following sections:
Table: Data security sections
Section name | Description | Link |
---|---|---|
About Data Security | This section lists the measures that are taken to improve data security. | See About data security. |
About Data Integrity | This section lists the measures that are taken to improve data integrity. | See About data integrity. |
About Data Classification | This section lists the measures that are taken to improve data classification. | |
About Data Encryption | This section lists the measures that are taken to improve data encryption. | See About data encryption . |
This chapter describes the web security implementation for the NetBackup appliance, using the following sections:
Table: Web security sections
Section name | Description | Link |
---|---|---|
About SSL certificates | This section lists the SSL certification updates for NetBackup Appliance Web Console. | See About SSL usage. |
Installing third-party SSL certificates | This section lists the procedure to install third-party SSL certificates. |
This chapter describes the network security implementation for the NetBackup appliance, using the following sections:
Table: Network security sections
Section name | Description | Link |
---|---|---|
About IPsec Channel Configuration | This section describes the IPsec configuration for NetBackup Appliances. | |
About NetBackup appliance ports | This section describes the port information for NetBackup Appliances. |
This chapter describes the Call Home security implementation for the NetBackup appliance, using the following sections:
Table: Call Home security sections
Section name | Description | Link |
---|---|---|
About AutoSupport | This section describes the AutoSupport feature in the NetBackup appliance. | See About AutoSupport . |
About Call Home | This section describes the Call Home feature in the NetBackup appliance. | See About Call Home. |
About SNMP | This section describes the SNMP feature in the NetBackup appliance. | See About SNMP. |
This chapter describes the guidelines that are adopted to secure IPMI configuration, using the following sections:
Table: IPMI security sections
Section name | Description | Link |
---|---|---|
Introduction to IPMI configuration | This section describes IPMI and how it is configured with the NetBackup appliance. | |
Listing the Recommended IPMI settings | This section lists the recommended IPMI settings for a secure configuration. |
This guide is intended for the users that include security administrators, backup administrators, system administrators, and IT technicians who are tasked with maintaining the NetBackup appliance.
Note:
The tasks and procedures in this document must be performed on a configured appliance. Local user commands cannot be used successfully before the appliance role is configured. Any attempted local user commands including, but not limited to granting user permissions, fail if the appliance role is not configured. If you attempt to run local user commands before role configuration, those same commands also fail after you complete the role configuration. Other commands can also exhibit unexpected or undesired behavior. To prevent this situation, it is a best practice to avoid attempting any local user commands until after the appliance role has been configured.