NW P Security Config Guide 19 9 en Us
NW P Security Config Guide 19 9 en Us
9
Security Configuration Guide
Dell Inc.
May 2023
Rev. 01
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2014 - 2023 Dell Inc. or its subsidiaries. All rights reserved. Dell Technologies, Dell, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
Contents
Figures..........................................................................................................................................6
Tables........................................................................................................................................... 7
Preface.........................................................................................................................................................................................8
Chapter 1: Introduction................................................................................................................ 12
Contents 3
NMC server log files................................................................................................................................................... 84
NetWorker Client log files......................................................................................................................................... 85
View log files................................................................................................................................................................. 87
Raw log file management.......................................................................................................................................... 90
Monitoring changes to the NetWorker server resources..................................................................................93
Configuring logging levels......................................................................................................................................... 93
NetWorker Authentication Service logs.....................................................................................................................100
NetWorker Authentication Service log files........................................................................................................ 100
NetWorker Authentication Service server log file management.....................................................................101
CLI log file management........................................................................................................................................... 101
NetWorker REST API log file management............................................................................................................... 102
Enabling or disabling the HEAD method for REST API calls........................................................................... 103
4 Contents
Security alert system settings...................................................................................................................................... 132
Monitoring changes to NetWorker server resources........................................................................................132
Security audit logging............................................................................................................................................... 132
Contents 5
Figures
6 Figures
Tables
1 Revision history.......................................................................................................................................................... 8
2 Style conventions..................................................................................................................................................... 10
3 Configuration options.............................................................................................................................................. 18
4 Default password policy requirements............................................................................................................... 40
5 NetWorker Authentication Service CLI options............................................................................................... 42
6 NMC user roles and associated privileges......................................................................................................... 45
7 Allowed Operations for each NetWorker privilege........................................................................................... 51
8 Privileges associated with each NetWorker User Group............................................................................... 54
9 Operations that require entries in the servers file........................................................................................... 76
10 NetWorker Server log files.................................................................................................................................... 82
11 NMC server log files............................................................................................................................................... 84
12 Client log files........................................................................................................................................................... 85
13 Message types..........................................................................................................................................................88
14 Raw log file attributes that manage log file size.............................................................................................. 90
15 Raw log file attributes that manage the log file trimming mechanism........................................................ 91
16 NetWorker Authentication Service log files.................................................................................................... 100
17 NetWorker REST API log files.............................................................................................................................102
18 Setting TCP parameters for each operating system.....................................................................................106
19 Standard NetWorker Client port requirements to NetWorker server....................................................... 107
20 Additional service port requirements for Snapshot clients..........................................................................108
21 Service port requirements for storage nodes................................................................................................. 108
22 NetWorker server program port requirements............................................................................................... 109
23 Port requirements to NMC server to each NetWorker client......................................................................110
24 nsrports options....................................................................................................................................................... 111
25 Port requirements for NetWorker communications with applications.......................................................112
26 Levels available for the nsrck process.............................................................................................................. 130
27 Security event resources and attributes - resource database (RAP).......................................................136
28 Security event resources and attributes - NetWorker client database.................................................... 138
29 Message types.........................................................................................................................................................141
30 Auditlog rendered service attributes................................................................................................................. 142
Tables 7
Preface
As part of an effort to improve product lines, periodic revisions of software and hardware are released. Therefore, all versions of
the software or hardware currently in use might not support some functions that are described in this document. The product
release notes provide the most up-to-date information on product features.
If a product does not function correctly or does not function as described in this document, contact a technical support
professional.
NOTE: This document was accurate at publication time. To ensure that you are using the latest version of this document,
go to the Support website https://www.dell.com/support.
Purpose
This document provides an overview of security settings available in the NetWorker product.
Audience
This document is part of the NetWorker documentation set, and is intended for use by system administrators who are
responsible for setting up and maintaining NetWorker and managing a secure network.
Revision history
The following table presents the revision history of this document.
Related documentation
The NetWorker documentation set includes the following publications, available on the Support website:
● NetWorker E-LAB Navigator
Provides compatibility information, including specific software and hardware configurations that NetWorker supports. To
access E-LAB Navigator, go to https://elabnavigator.dell.com/eln/elnhome.
● NetWorker Administration Guide
Describes how to configure and maintain the NetWorker software.
● NetWorker for Network Data Management Protocol (NDMP) User Guide
Describes how to use the NetWorker software to provide data protection for NDMP filers.
● NetWorker Cluster Integration Guide
Contains information related to configuring NetWorker software on cluster servers and clients.
● NetWorker Installation Guide
Provides information on how to install, uninstall, and update the NetWorker software for clients, storage nodes, and servers
on all supported operating systems.
● NetWorker Update Guide
Describes how to update the NetWorker software from a previously installed release.
● NetWorker Release Notes
8 Preface
Contains information on new features and changes, fixed problems, known limitations, environment and system requirements
for the latest NetWorker software release.
● NetWorker Command Reference Guide
Provides reference information for NetWorker commands and options.
● NetWorker and Data Domain Boost Integration Guide
Provides planning and configuration information on the use of Data Domain devices for data deduplication backup and
storage in a NetWorker environment.
● NetWorker Performance Optimization Planning Guide
Contains basic performance tuning information for NetWorker.
● NetWorker Server Disaster Recovery and Availability Best Practices Guide
Describes how to design, plan for, and perform a step-by-step NetWorker disaster recovery.
● NetWorker Snapshot Management Configuration Guide
Describes the ability to catalog and manage snapshot copies of production data that are created by using mirror technologies
on storage arrays.
● NetWorkerSnapshot Management for NAS Devices Configuration Guide
Describes how to catalog and manage snapshot copies of production data that are created by using replication technologies
on NAS devices.
● NetWorker Security Configuration Guide
Provides an overview of security configuration settings available in NetWorker, secure deployment, and physical security
controls needed to ensure the secure operation of the product.
● NetWorker and VMware Integration Guide
Provides planning and configuration information on the use of VMware in a NetWorker environment.
● NetWorker Error Message Guide
Provides information on common NetWorker error messages.
● NetWorker Licensing Guide
Provides information about licensing NetWorker products and features.
● NetWorker REST API documentation
Contains the NetWorker APIs and includes tutorials to guide you in their use.
● CloudBoost Integration Guide
Describes the integration of NetWorker with CloudBoost.
● CloudBoost Security Configuration Guide
Provides an overview of security configuration settings available in NetWorker and Cloud Boost, secure deployment, and
physical security controls needed to ensure the secure operation of the product.
● NetWorker Management Console Online Help
Describes the day-to-day administration tasks performed in the NetWorker Management Console and the NetWorker
Administration window. To view the online help, click Help in the main menu.
● NetWorker User Online Help
Describes how to use the NetWorker User program, which is the Windows client interface, to connect to a NetWorker
server to back up, recover, archive, and retrieve files over a network.
Typographical conventions
The following type style conventions are used in this document:
Preface 9
Table 2. Style conventions
Formatting Description
Bold Used for interface elements that a user specifically selects or clicks, for example, names of
buttons, fields, tab names, and menu paths. Also used for the name of a dialog box, page,
pane, screen area with title, table label, and window.
Italic Used for full titles of publications that are referenced in text.
Monospace Used for:
● System code
● System output, such as an error message or script
● Pathnames, file names, file name extensions, prompts, and syntax
● Commands and options
Monospace italic Used for variables.
Monospace bold Used for user input.
[] Square brackets enclose optional values.
| Vertical line indicates alternate selections. The vertical line means or for the alternate
selections.
{} Braces enclose content that the user must specify, such as x, y, or z.
... Ellipses indicate non-essential information that is omitted from the example.
You can use the following resources to find more information about this product, obtain support, and provide feedback.
Knowledgebase
The Knowledgebase contains applicable solutions that you can search for either by solution number (for example, KB000xxxxxx)
or by keyword.
To search the Knowledgebase:
1. Go to https://www.dell.com/support.
2. On the Support tab, click Knowledge Base.
3. In the search box, type either the solution number or keywords. Optionally, you can limit the search to specific products by
typing a product name in the search box, and then selecting the product from the list that appears.
Live chat
To participate in a live interactive chat with a support agent:
10 Preface
1. Go to https://www.dell.com/support.
2. On the Support tab, click Contact Support.
3. On the Contact Information page, click the relevant support, and then proceed.
Service requests
To obtain in-depth help from Licensing, submit a service request. To submit a service request:
1. Go to https://www.dell.com/support.
2. On the Support tab, click Service Requests.
NOTE: To create a service request, you must have a valid support agreement. For details about either an account or
obtaining a valid support agreement, contact a sales representative. To find the details of a service request, in the
Service Request Number field, type the service request number, and then click the right arrow.
Online communities
For peer contacts, conversations, and content on product support and solutions, go to the Community Network https://
www.dell.com/community. Interactively engage with customers, partners, and certified professionals online.
Preface 11
1
Introduction
NetWorker is a heterogeneous backup application that addresses data protection challenges. The centralized management
capabilities of NetWorker provides effective data protection for file systems, enterprise applications, storage arrays, and NAS
filers to a variety of target devices.
This guide provides an overview of security configuration settings available in NetWorker, secure deployment, and physical
security controls needed to ensure the secure operation of the product.
This guide is divided into the following sections:
Access Control Access control settings enable the protection of resources against unauthorized access. This chapter
Settings provides an overview of the settings available in the product to ensure a secure operation of the product
and describes how you can limit product access by end-users or by external product components.
Log Settings A log is a chronological record that helps you to examine the sequence of activities surrounding or leading
up to an operation, procedure, or event in a security-related transaction from beginning to end. This
chapter describes how to access and manage the logs files available in NetWorker.
Communication Communication security settings enable the establishment of secure communication channels between
Security Settings NetWorker components, NetWorker components and external systems, and NetWorker components
and external components. This chapter describes how to ensure NetWorker uses secure channels for
communication and how to configure NetWorker in a firewall environment.
Data Security Data security settings enable you to define controls that prevent unauthorized access and disclosure
Settings of data permanently stored by NetWorker. This chapter describes the settings available to ensure the
protection of the data handled by NetWorker.
NOTE: Any references to the Data Domain systems and the Data Domain devices in the document indicate PowerProtect
DD appliances.
12 Introduction
2
Access Control Settings
Access control settings enable the protection of resources against unauthorized access. This chapter describes settings you can
use to limit access by end-user or by external product components.
Topics:
• NetWorker Authentication Service
• NetWorker Authentication Service database
• Managing authentication
• Managing the NetWorker Authentication Service options
• How user authentication and authorization works in NMC and NetWorker
• How user authentication and authorization works in NWUI
• Disabling SSLv3 cipher connectivity to the PostgresSQL database on the NMC server
• Disabling TLS 1.0 and TLS 1.1 connections to PostgresSQL database port 5432 on the NMC server
• Component access control
• Generate self signed certificate
• Using Self or CA Signed Certificate in Linux
• Install Entrust root and Intermediate CA certificates
• Import CA signed certificates
• Replace CA signed certificate in Postgres
• Replace CA signed certificate in NWUI
Managing authentication
The NetWorker Authentication Service is a web-based application that provides authentication services to other applications.
The NetWorker Authentication Service maintains a local user database to verify the credentials of a user account. You can also
configure the NetWorker Authentication Service to use an external authority database, for example LDAP or AD. When you
configure an external authority database, the NetWorker Authentication Service communicates directly with an LDAP or AD
server to authenticate users.
You can use command line tools to configure and manage the authentication.
NOTE: If the authc server is installed in Java-9, and in case you try to execute the authc command/ script using Java-8,
you will not be allowed to execute the script. This issue is most likely to occur when you have both Java-8 and Java-9
running on the setup.
To resolve this issue you can perform either of the following:
● Include Djavax.net.ssl.trustStorePassword=XXXXX in CLI script.
● Copy key keystore.password and value from authc-server.app.properties to authc-server.cli.properties.
NOTE: The LDAP Configuration wizard is only supported from the NetWorker 18.1 release.
1. (Optional) Create a tenant in the local database for the external authority. If you do not create a tenant, the configuration
uses the Default tenant, which has an ID of 1. To create a tenant, type the following command:
authc_config -u administrator -p "password" -e add-tenant -D "tenant-name=name" -D
"tenant-alias=alias" -D "tenant-details=
tenant_description"
NOTE: For multiple authentication providers of the same protocol, you cannot share the same tenant ID.
2. Connect to the NMC server with a NetWorker Authentication Service administrator account.
The Console window opens with three tabs—Enterprise, Reports, and Setup.
3. Click Setup.
The Users and Roles window appears.
4. In the left navigation pane, select Users and Roles > External Authority.
The External Authority pane displays in the right of the Console window.
5. Right-click in the External Authority pane and select New from the drop-down.
The Create External Authentication Authority dialog displays.
8. In the Configuration Parameters pane, if you are not using the default port 389, type the correct Port Number.
9. In the Configuration Parameters pane, for the User Group field, type the name of a user account that has full read
access to the LDAP or AD directory in the format " CN=XXXX,OU=YYYY", and then type the User DN password. XXXX is
the common name and YYYY is the organizational unit name. Alternatively, if there is no OU configured, you can specify the
CN and DC components instead. The NMC Property Help provides more information and examples for the User Group field.
10. If any of the default values that are populated in the Advanced Configuration Parameters fields do not match your
LDAP/LDAPS/AD server configuration, change the values accordingly. If these values do not match your configuration, the
provider creation process fails.
11. Click OK.
NOTE: All fields in the Configuration Parameters pane of the dialog are mandatory. If you click OK and any of these
fields is missing, NMC displays an error message.
Validation of the provider occurs during the connection attempt with the server. If the domain or FQDN could not be
validated, then an error is logged in NMC.
After creating a provider, you can double-click the entry in the External Authority pane to view the properties of the provider.
The Edit External Authentication Authority dialog displays.
Within this dialog, you can modify any of the read/write fields. Note that the Authority Name and Tenant fields will be grayed
out. You can only modify these fields when you create the provider in the Create External Authentication Authority dialog.
When you change any of the fields and click OK, a prompt appears requesting you to re-enter the password. After a message
displays indicating that the change was successful, close the Edit External Authentication Authority dialog and then re-open
to view the change.
NOTE: After you log in as an AD or LDAP user, ensure that you do not change the Group Search Path and the User
Search Path values. If you change the Group Search Path and the User Search Path values, the earlier saved values are
lost, and you cannot access information that is related to users, groups, and so on.
where:
● name is the name of the tenant, without spaces. The maximum number of characters is 256. Specify ASCII characters
in the tenant name only.
● alias is alias of the tenant name. The maximum number of characters is 256.
NOTE: You require the tenant ID to configure the LDAP or AD authentication authority in the local database.
2. From a command prompt on the NetWorker server, type the following command:
authc_config -u administrator -p "password" -e add-config -D "tenant-id=tenant_id" -D
options....
NOTE: Ensure that you have a space before each -D. If you do not have a space before the -D switch, authc_config
appends the -D to the previous option value and ignores the option value to which the -D is associated with.
The following table provides more information about each configuration option.
Default value: NO
Default value: No
After you configure the NetWorker Authentication Service to use LDAP authentication, configure the NMC and NetWorker
server to authorize the users.
The following figure provides an example of the key group attributes that you use when you configure the AD authority.
NetWorker provides a template file that you can modify with the configuration values that are specific to your environment, and
then run to configure AD authentication.
The location and name of the file differs on Windows and Linux:
● AD template file:
NOTE: In this example, to restrict NMC and NetWorker servers access to only users in the NetWorker_admins group,
you must configure the NMC Roles on the NMC server and the User Groups resource on the NetWorker server. The
section "User authentication and authorization" provides more information.
3. Save the file, and then remove the .template extension.
4. Use the authc_mgmt command with the -e query-ldap-users option along with the query-domain and query-tenant
options to confirm that you can successfully query the AD directory:
authc_mgmt -u administrator -p "Password1" -e query-ldap-users -D "query-tenant=IDD" -D
"query-domain=ldapdomain"
The following figure provides an example of the key group attributes that you use when configuring the LDAP authority.
NetWorker provides a template file that you can modify with the configuration values that are specific to your environment, and
then run to configure AD authentication.
The location and name of the file differs on Windows and Linux:
● LDAP template file:
○ Windows—C:\Program Files\EMC NetWorker\nsr\authc-server\scripts\authc-create-ldap-
config.bat.template
○ Linux—/opt/nsr/authc-server/scripts/authc-create-ldap-config.sh.template
To use the template file, perform the following steps:
1. Use a text editor to open the file.
2. Replace the variables enclosed in <> with the values that are specific to your configuration. The following output provides an
example of the contents of the file after substituting the attributes for your configuration:
NOTE: If you are adding external authority using IPv6, then you must enclose the IPv6 address within a square bracket.
3. Save the file, and then remove the .template extension.
4. Run the script file.
5. To confirm that you can successfully query the LDAP directory, use the authc_mgmt command with the -e query-ldap-
users option:
authc_mgmt -u administrator -p "Password1" -e query-ldap-users -D "query-tenant=IDD" -D
"query-domain=ldapdomain"
where:
● java_path is /opt/nre/java/latest on UNIX if NRE is installed. java_path is /usr/java/latest if NRE is not
installed.
2. (Optional) If the keystore contains expired trusted Java certificates for the LDAPS server, delete the certificates:
java_path/bin/keytool -delete -alias
LDAPS_server -keystore
java_path/lib/security/cacerts -storepass
"password"
where:
● LDAPS_server is the hostname of the LDAPS server.
● "password" is the Java trust keystore password.
NOTE: The time on NetWorker server must be in sync with the LDAPS server.
3. To obtain a copy of the CA certificate from the LDAPS server, use the openssl command:
openssl s_client -showcerts -connect
LDAPS_server:636
where:
● LDAPS_server is the hostname of the LDAPS server.
● The openssl command may display two certificates. The last certificate is usually the CA certificate.
NOTE: By default, a Windows host does not include the openssl program. The OpenSSL website describes how to
obtain an openssl program from a third party provider.
4. Copy the CA certificate, including the -----BEGIN CERTIFICATE----- header and the -----END CERTIFICATE----- footer into
a text file.
For example:
-----BEGIN CERTIFICATE-----
aklfhskfadljasdl1340234234ASDSDFSDFSDFSDFSD
....
-----END CERTIFICATE-----
NOTE: The openssl command may display two certificates. The second certificate is usually the CA certificate.
where:
● LDAPS_server is the hostname of the LDAPS server.
● java_path is /opt/nre/java/latest on UNIX if NRE is installed. java_path is /usr/java/latest if NRE is not
installed.
● java_path is C:\Program Files\NRE\Java on Windows if NRE is installed. java_path is C:\Program
Files\Java if NRE is not installed.
6. When prompted to trust the certificate, type Yes, and then press Enter.
7. Restart the NetWorker server after importing the new certificate into the cacerts store file.
8. To configure LDAPS authentication authority in the NetWorker Authentication Service, use the authc_config command.
You can also configure Active Directory or LDAP using NMC or the NetWorker UI.
For example:
authc_config -u administrator -p "1.Password" -e add-config
-D "config-tenant-id=33"
-D "config-name=LDAPS"
-D "config-domain=IDDS"
-D "config-server-address=ldaps://ldaps.emc.com:636"
-D "config-user-dn=cn=Directory Manager"
-D "config-user-dn-password=1.Password"
-D "config-user-id-attr=uid"
-D "config-user-object-class=inetOrgPerson"
-D "config-user-search-path=ou=People,dc=talisman-ds6,dc=com"
-D "config-group-member-attr=uniqueMember"
-D "config-group-name-attr=cn"
-D "config-group-object-class=groupOfUniqueNames"
-D "config-group-search-path=ou=Group,dc=talisman-ds6,dc=com"
-D "config-object-class=objectclass"
-D "config-active-directory=n"
-D "config-search-subtree=y"
Configuration LDAPS is created successfully.
NOTE:
● If you are adding external authority using IPv6, then you must enclose the IPv6 address within a square bracket.
● When you define the config-server-address option, ensure that you specify ldaps as the protocol and the appropriate
LDAPS port number.
9. To confirm that you can successfully query the LDAP directory, use the authc_mgmt command with the -e query-
ldap-users option. For example:
Error executing command. Failure: 400 Bad Request. Server message: Failed to verify
configuration LDAPS: An SSL handshake error occurred while attempting to connect to
LDAPS server: timestamp check failed.
Workaround
● Ensure that the date and time on the NetWorker server is in sync with the LDAP server.
This message means that the certificate has expired and cannot be used. The notAfter field shows the validity of this
certificate. Due to differences noticed in the output of the keytool command, it is recommended that you use the
OpenSSL tool.
Error executing command. Failure: 400 Bad Request. Server message: Failed to verify configuration config_name:
Authentication error occurred while accessing the naming or directory service: [LDAP: error code 49 - Invalid Credentials]
This error message appears when the external authentication authority cannot successfully validate the user credentials that
were specified in the external authentication authority configuration.
To resolve this issue, correct the value defined in the config-user-dn or config-user-dn-password option.
Error executing command. Failure: 400 Bad Request. Server message: Failed to verify configuration config_name: Error
occurred while attempting to connect to a remote server 'hostname:port'. Connection refused: connect
This error messages appears when the NetWorker Authentication Service cannot connect to the LDAP or AD server by using
the port number specified in the config-server-address option in the external authentication authority configuration.
To resolve this issue, correct the port number defined in the config-server-address option.
Error executing command. Failure: 400 Bad Request. Server message: Failed to verify configuration config_name: Cannot
resolve host
This error messages appears when the NetWorker Authentication Service cannot resolve the host name of the LDAP or AD
server specified in the config-server-address option in the external authentication authority configuration.
To resolve this issue, perform the following tasks:
● Ensure that the NetWorker server can resolve the hostname and IP address of the LDAP or AD server, and that the LDAP or
AD server can resolve the hostname and IP address of the NetWorker server.
● Ensure that the hostname or IP address that you specified in the config-server-address option is correct.
Error executing command. Failure: 400 Bad Request. Server message: Failed to verify configuration config_name: Error
occurred while attempting to resolve component name 'component_name'
This error message appears when the external authentication authority cannot successfully validate the user or group search
path that was specified in the external authentication authority configuration.
To resolve this issue, correct the value defined in the config-user-search-path or config-group-search-path option.
Error executing command. Failure: 400 Bad Request. Server message: Failed to verify configuration config_name: Error
occurred while attempting to resolve component name 'component'
This error message appears when the external authentication authority cannot successfully validate the base DN specified in the
config-server-address.
To resolve this issue correct the base DN value that is defined in the config-server-address option.
For example:
authc_config -u administrator -p "Password1" -e find-all-configs
2. To determine the properties of the provider configuration, use the authc_config with the -e find-config option:
authc_config -u username -p "password" -e find-config -D "config-id=config_id"
3. To determine the tenant name that is associated with the tenant, use the authc_config with the -e find-tenant option:
For example, to display information about a tenant with tenant ID 33, type:
authc_config -u administrator -p "Password1" -e find-tenant -D "tenant-id=33"
Tenant Id : 33
Tenant Name : IDD
Tenant Alias : IDD-alias
Tenant Details:
To view all the available operations, use the authc_config -help command.
4. To query the external authority database, use the authc_mgmt command with one of the query options:
For example, to display the group membership for a specific user in the iddconfig, perform the following steps:
a. If the username is not known, to determine the username, use the authc_mgmt command with the -e query-ldap-users
option. For example, type:
authc_mgmt -u administrator -p "1.Password" -e query-ldap-users -D "query-tenant=IDD"
-D "query-domain=idddomain"
Administrator cn=Administrator,cn=Users,dc=iddlab,dc=local
Konstantin cn=Konstantin,cn=Users,dc=iddlab,dc=local
Katherine cn=Katherine,cn=Users,dc=iddlab,dc=local
Viktoryia cn=Viktoryia,cn=Users,dc=iddlab,dc=local
Patrick cn=Patrick,cn=Users,dc=iddlab,dc=local
Liam cn=Liam,cn=Users,dc=iddlab,dc=local
Meghan cn=Meghan,cn=Users,dc=iddlab,dc=local
b. To determine the group membership for a user, use the authc_mgmt command with the -e query-ldap-groups-for-user
option. For example, to display the group membership for the user Konstantin, type:
NetWorker cn=NetWorker,dc=iddlab,dc=local
Error executing command. Failure: 400 Bad Request. Server message: Failed to verify
configuration LDAPS: An SSL handshake error occurred while attempting to connect to LDAPS
server: timestamp check failed
This error message is seen during an authc_config operation. You must ensure that the following requirements are met from the
NetWorker server:
● Ensure that the date and time on NetWorker server is in sync with the LDAP server.
● Verify if the certificate is a valid one by running the openssl s_client -connect -CAfile command. If the
command returns a “Verify return code: 10 (certificate has expired)” message, it means that the
certificate has expired and cannot be used. The notAfter field shows the validity of the certificate.
Error executing command. Failure: I/O error on POST request for " host":Connection to host
refused; nested exception is org.apache.http.conn.HttpHostConnectException: Connection to
host refused
This error messages appears when the NetWorker Authentication Service cannot connect to the LDAP or AD server by using
the port number specified in the config-server-address option in the external authentication authority configuration.
To resolve this issue, correct the port number defined in the config-server-address option.
For example, to update the config-server-address value in the config-server-address in the iddconfig configuration, type the
following command:
authc_config -u administrator -p "1.Password" -e update-config -D config-id=1 -D "config-
server-address:ldap://idd-ad.iddlab.local:389/dc=iddlab,dc=local"
Configuration iddconfig is updated successfully.
Error executing command. Failure: 400 Bad Request. Server message: Failed to perform LDAP
task task: Cannot resolve host 'hostname'
This error messages appears when the NetWorker Authentication Service cannot resolve the host name of the LDAP or AD
server specified in the config-server-address option in the external authentication authority configuration.
To resolve this issue, perform the following tasks:
● Ensure that the NetWorker server can resolve the hostname and IP address of the LDAP or AD server, and that the LDAP or
AD server can resolve the hostname and IP address of the NetWorker server.
● Ensure that the hostname or IP address that you specified in the config-server-address option is correct.
If required, update the config-server-address value. For example, to update the config-server-address value in the config-
server-address in the iddconfig configuration, type the following command:
authc_config -u administrator -p "1.Password" -e update-config -D config-id=1 -D "config-
server-address:ldap://idd-ad.iddlab.local:389/dc=iddlab,dc=local"
Configuration iddconfig is updated successfully.
Using NMC to create or modify user accounts in the local user database
Perform the following steps to create users in the NetWorker Authentication Service local database.
Log in to the NMC server as a Console Security Administrator. The NetWorker Authentication Service administrator account is a
Console Security Administrator.
1. From the Console window, click Setup.
2. Perform one of the following steps:
● To create a new user, right-click in the Users window pane, and then select New.
● To modify an existing user, right-click the user account, and then select Properties.
3. For new users only, in the User Name field, specify the name for the user account, without spaces.
The maximum number of allowed characters is 64.
4. (Optional) Specify information in the First Name, Last Name, Email, and Description fields.
5. In the Groups field, select the required NetWorker Authentication Service groups.
6. In the NMC Role field, select the roles that the user has on the NMC server. The NMC roles define the access level that the
user has on the NMC server.
NOTE: To manage users, the Console Security Administrator role requires that the user account to also be a member
of the Administrators group. If you do not add a user with the Console Security Administrator role to an administrator
group, the user can only manage NMC Roles.
7. In the Password and Confirm Password fields, specify a password for the user that meets the password policy settings
that are defined for the environment.
The default password policy requires that the password meets the following minimum requirements:
● Nine characters long
● One uppercase letter
● One lowercase letter
● One special character
● One numeric character
Creating groups
To create a new group, use the -e add-group option:
authc_mgmt -u administrator -p "password" -e add-group -D "group-name=group_name" [-D
"group-details=description"] [-D "group-users=userID1, userID2..."]
For example, to create a group that is named test, type the following command:
authc_mgmt -u administrator -p "1.Password" -e add-group -D "group-name=test" -D "group-
details=New local database group"
Group is created successfully.
To display information about a group named test, type the following command:
NOTE: You specify the group ID value when you create a user or add a user to an existing group.
Creating users
To create a user, use the -e add-user option:
authc_mgmt -u administrator -p "password" -e add-user -D "user-name=user_name"
[-D "user-password=password"] [-D "user-first-name=firstname"] [-D "user-last-
name=last_name"] [-D "user-details=description" [-D "user-email=email_address"] [-D "user-
groups=group_ID1,group_ID2..."] [-D "user-enabled=yes_or_no"
For example, to create a user account Patd and add the account to a group named test, type:
For example, to update the email address for the user account PatD, type the following command:
For example, to view details about the user account PatD, type:
For example, to set the user-must-change-password option for the user Patd , type:
authc_mgmt -u administrator -p "1.Password" -e update-user-options -D "user-options-
userid=1064" -D "user-
options-password-must-change=true"
The user options for user 1,064 is updated successfully.
The user cannot manage the NetWorker Authentication Service until the password is changed. For example:
The authc_mgmt UNIX man page and the NetWorker Command Reference Guide provides detailed information about all the
configuration options.
For example, to add the FULL_CONTROL permission to a local group called authgroup, perform the following steps:
1. To determine the Group DN, use -e find-group option:
authc_mgmt -e find-group -u administrator -p "1.Password" -D group-name=authgroup
Group Id : 164
Group Name : authgroup
Group Details:
Group DN : cn=authgroup,cn=Groups,dc=bu-iddnwserver2,dc=IddLab,dc=local
Group Users : PatD
2. Use the -e add-permission option to add the FULL_CONTROL permission to the authgroup:
authc_config -e add-permission -u administrator -p "1.Password"
-D permission-name=FULL_CONTROL -D permission-group-dn=cn=authgroup,cn=Groups,dc=bu-
iddnwserver2,dc=IddLab,dc=local
Permission FULL_CONTROL is created successfully
3. To confirm the properties of the group, use the -e find-all-permissions option:
NOTE: The output abbreviates the Group DN Pattern and Group DN values. Use the find-permission option to see the
complete value information.
The UNIX man page and the NetWorker Command Reference Guide provides detailed information about how to use
authc_config to manage permissions.
where:
○ "username" is the name of the user whose password you want to change, or local administrator account.
○ "current_password" is the current password for the username that you specified.
○ "new_password" is the new password for the username that you specified.
For example, to change the password for the local administrator account, type the following command:
authc_mgmt -u administrator -p "1.Password" -e update-password -D password-new-
value="1.Updated2"
NOTE: To change the password without typing the new password in the command string, do not include the -D
password-new-value="new_password" option. The command will prompt you for the new password and will not display
the characters.
● To use the administrator account to change the password for any user, use the -e update-user option with the -D user-
name and -D user-password options:
authc_mgmt -u administrator -p "current_password" -e update-user -D user-name=username -D
user-password="new_password"
where:
○ "current_password" is the password for the administrator account.
○ "username" is the name of the user whose password you want to change.
○ "new_password" is the new password that you want to set for the user.
For example, to change the password for a local user who is named Noelle to ".Mynewpass1", type the following
command:
authc_mgmt -u administrator -p "1.Password" -e update-user -D user-name=Noelle -D user-
password=".Mynewpass1"
NOTE: Ensure that the recent catalina log containing server startup is in [yyy] milliseconds message.
Where:
● "current_password" is the password for the administrator account.
NOTE: For Windows, go to the location C:\Program Files\EMC NetWorker\nsr\authc-server\bin, and
run the authc_mgmt command.
For example, to lock an administrator account whose username is administrator and password is Emclegato@123,
type the following command:
Type yes
Are you sure to lock admin account? Please type yes to continue is displayed.
Type yes
NOTE: To recover the password, see Resetting the forgotten administrator password.
Where mypassword_out.txt is the name of the output file that contains the Base64 encoded password.
Output similar to the following appears:
Input Length = 10
Output Length = 74
CertUtil: -encode command completed successfully.
The contents of the mypassword_out.txt file contains the following encoded text for the password value
"1.Password":
-----BEGIN CERTIFICATE-----
MS5QYXNzd29yZA==
-----END CERTIFICATE-----
The command displays the encoded text for the password value "1.Password": MS5QYXNzd29yZA==
2. Use a text editor to open the authc-local-config.json.template file, which is located in the C:\Program
Files\EMC NetWorker\nsr\authc-server\scripts folder on Windows and the /opt/nsr/authc-server/
scripts directory on Linux.
3. In the template file, perform the following steps:
a. Replace the your_username variable with the name of the administrator account for which you want to reset the
password.
b. Replace the your_encoded_password variable with the base64 encoded password value.
For example, to reset the password for the user account administrator with a password of "1.Password ", the modified file
appears as follows:
{
"local_users": [
{
"user name": "administrator",
"password": "MS5QYXNzd29yZA=="
}]
}
4. Rename the authc-local-config.json.template file to authc-local-config.json.
5. Copy the authc-local-config.json file to the Tomcat conf folder.
By default, the conf folder is/nsr/authc/conf on Linux and C:\Program Files\EMC NetWorker\authc-
server\tomcat\conf on Windows.
NOTE: If the NetWorker server is also the NMC server, start the NMC server service. Type the following
commands: net start gstd
● For Linux, type the following commands:
/etc/init.d/networker stop
/etc/init.d/networker start
When the NetWorker Authentication Service starts, the startup process checks for the authc-local-config.json.
If the file exists and the password adheres to the minimum password policy requirements defined for a password, the
NetWorker Authentication Service resets the password. Review the authc-server.log file for errors.
By default, the authc-server.log file is located in /nsr/authc/logs on Linux and C:\Program Files\EMC
NetWorker\authc\tomcat\logs on Windows.
NOTE: The startup process automatically deletes the authc-local-config.json file to ensure that the password
is not reset the next time that you restart the NetWorker Authentication Service.
8. To confirm that you can connect to the NetWorker Authentication Service with the new password, use the authc_mgmt
command.
For example:
authc_mgmt -u administrator -p "1.Password" -e find-all-users
TokenStartTimeDeltaInMinutes
Defines the maximum time difference in minutes that the NetWorker server accepts when validating the start time of a token.
The default value is -5. Use this value to ensure that when the NetWorker server validates the token start time, the service
does not reject the token because of unsynchronized clocks in the NetWorker datazone.
For example, to change the TokenStartTimeDeltaInMinutes to -15, perform the following steps:
1. To change the default value, use the -e add-option option:
authc_config -u administrator -p "Password1" -e add-option -D option-
name=TokenStartTimeDeltaInMinutes -D option-value=-15
Option Id: 2
Name : TokenStartTimeDeltaInMinutes
Value : -15
TokenTimeoutInMinutes
The SAML token expiration timeout in minutes. The default value is 480 minutes (8 hours).
NOTE: The TokenTimeoutInMIintes parameter is case sensitive.
For example, to change the TokenTimeoutInMinutes to 12 hours (720 minutes), perform the following steps:
1. To change the default value, use the -e add-option option:
authc_config -u administrator -p "Password1" -e add-option -D option-
name=TokenTimeoutInMinutes -D option-value=720
Option Id: 3
Name : TokenTimeoutInMinutes
Value : 720
To control the password policy requirement for user accounts, perform the following steps:
● To modify password policy requirements, type the following command:
where option is one of the password policy options in the previous table.
For example, to change the default password expiration policy from 90 days to 30 days, type:
authc_config -e add-option -u administrator -p "1.Password" -D "option-
name=PasswordExpirationDays" -D "option-value=30"
For example:
authc_config -u administrator -p "1.Password" -e find-all-options
The query returns 1 records.
Option Id Name
1 PasswordExpirationDays
NOTE: The find-all-options operation does not display options that you have not changed from the default
values.
● To review the details about a specific option that has been modified from the default value, type:
authc_config -u username -p "password" -e find-option -D option-id=option_id
where option_id is the option ID value that appears in the find-all-options output for the password policy option.
For example, to display the details about the PasswordExpirationDays option, type:
The max.failure.login.attempts variable takes any number more than 0, and it allows those many consecutive failed login
attempts before locking the user account. The locked.user.reset.time.in.hours variable is by default set to 24. This means that
the locked user account will be unlocked after 24 hours on providing the correct credentials. The attack prevention feature will
be disabled when either of the two variables is set to 0. Since the default value of max.failure.login.attempts attribute is 0, the
feature is disabled by default during new installation.
The default administrator account is exempted from the lockout policy and is not locked. The account gets automatically
unlocked after the specified number of hours is set to locked.user.reset.time.in.hours variable or the accounts could remain
locked until it is manually unlocked by the user who is part of the administrator group. Command line tool Authc_mgmt can be
used to unlock the user using the command authc_mgmt -u <ADMINUSER> -p <PASSWORD> -e unlock-user -D
user-name <USERNAME>.
NOTE: A user that is locked through Brute-force attack, is not able to log in to NWUI, NMC, and nsrlogin.
The configured values, max.failure.login.attempts and locked.user.reset.time.in.hours are retained during subsequent upgrades.
Token expiration
The token policies that are defined in the NetWorker Authentication service database determine how long a token remains valid:
● When the token for a CLI authenticated user expires, in-progress user-initiated operations complete, but the user cannot
start new operations until a new token is issued to the user. To issue a new token for a CLI operation, the user must run the
nsrlogin command again.
● When the token expires while a user is connected to the NetWorker Administration window, a token expiration message
appears and the connection to the NetWorker server closes. A prompt appears requesting that the user specify their
password and generate a new token. After a new token is issued, the user can re-establish the connection to the NetWorker
server.
● When the token expires while a user is connected to the NMC UI, a token expiration message appears and the user is
prompted to specify their password and generate a new token. After a new token is issued, the user can use the NMC UI.
Troubleshooting authorization errors and NetWorker server access issues provides more information about how to resolve token
expiration messages that appear on a NetWorker server.
User authorization
User authorization settings control the rights or permissions that are granted to a user and enable access to a resource
managed by NetWorker.
Tasks include:
Configuring NetWorker Authentication Service local user access to the NMC server
After you create new users in the NetWorker Authentication Service database, assign the user to an NMC role to enable user
access to the NMC server.
1. Connect to the NMC server with a NetWorker Authentication Service administrator account.
2. Click Setup.
The Users and Roles window appears.
3. In the left navigation pane, select Users and Roles > NMC Roles.
where:
● tenant_name is the name of the tenant that you specified when you configured the external authentication authority
configuration on the NetWorker Authentication Service. If you use the Default tenant, you are not required to specify the
tenant name.
● domain_name is the name of the domain that you specified when you configured the external authentication authority
configuration on the NetWorker Authentication Service.
● user_name is the name of the user in the LDAP or AD directory, which you added to the External Roles attribute or is a
member of the group that you added to the External Roles attribute.
For example, to specify an AD account that is named Liam in an external authentication authority that you configured in
an authentication service domain that is called IDDdomain and a tenant that is called IDD, specify the following username:
IDD\IDDdomain\Liam.
Troubleshooting login errors provides information about how to troubleshoot login issues.
3. Connect to the NMC server with the NetWorker Authentication Service administrator account.
4. On the Setup window select Users and Roles > NMC Roles > Console Security Administrator.
5. In the External Roles attribute, paste the group dn value. The following figure provides an example of the group dn entry
for the AlbertaTestGroup1 group.
Server authorization
The NetWorker server provides a mechanism to authorize users that perform operations from a command prompt and from the
NMC GUI.
● User groups
● Security Audit log resource
● Server resource
NOTE: The Change Security Settings privilege requires that you also set the
following prerequisite privileges: View Security Settings, Create Security
Settings, and Delete Security Settings.
● User groups
● Audit log resource
● Server resource
Create Security Settings The ability to create user group resources.
NOTE: The Create Security Settings privilege requires that you also set the
following prerequisite privileges: View Security Settings, Change Security
Settings, and Delete Security Settings.
Delete Security Settings The ability to delete user created user groups. You cannot delete preconfigured
user groups.
NOTE: The Delete Security Settings privilege requires that you also set the
following prerequisite privileges: View Security Settings, Change Security
Settings, and Delete Security Settings.
● Remotely browse and recover data that are associated with any client.
● View all client resources configuration attributes.
NOTE: The Remote Access All Clients privilege requires that you also set the
following prerequisite privileges: Operate NetWorker, Monitor NetWorker,
Operate Devices and Jukeboxes, Backup Local Data, and Recover Local
Data.
Configure NetWorker The ability to configure resources that are associated with the NetWorker server,
storage nodes, and clients. For example creating, editing, and deleting resources.
This privilege does not enable users to configure user group resources.
NOTE: The Configure NetWorker privilege requires that you also set the
following prerequisite privileges: Operate NetWorker, Monitor NetWorker,
Operate Devices and Jukeboxes, Backup Local Data, and Recover Local
Data.
This privilege enables a user to view information about other clients and does not
override file-based privileges.
Users can only recover files with the user privileges for that operating system. To
perform save set or NDMP recoveries, users with the privilege must log in to the
local host as root (UNIX) or administrator (Windows).
● Manually back up data from their local client to the NetWorker server.
● View most attributes in the client's configuration.
● Query the client save sets and browse the client file index.
This privilege does not enable a user to view information about other clients and
does not override file-based privileges.
Users can only back up files with the user privileges for that operating system. To
run the
nsrpolicy command or to perform NDMP backups, users with this privilege must
log in to the local hosts as root (UNIX) or administrator (Windows). To allow
scheduled backups to operate correctly, the root user (UNIX) or administrator
(Windows) on the client has this privilege automatically.
Archive Data The ability to archive data. The NetWorker application administrator must have
configured NetWorker for a user with this privilege to run this operation. Only
the client resource that pertains to the client that issues the archive command is
viewable.
Backup Remote Data Allows users to remotely back up data.
Recover Remote Data Allows users to recover data for a back up performed on another server.
6. In the External roles attribute, specify the dn of the users and groups.
Modifying NetWorker user group membership for NMC provides more information.
7. In the Privileges attribute, select the privileges to assign to the user group.
8. Click OK.
"query-tenant=IDD" -D
2. To display information about a group named test, type the following command:
authc_mgmt -u administrator -p "1.Password" -e find-group -D "group-name=test"
Group Id : 132
Group Name : test
Group Details: New local database group
Group DN : cn=test,cn=Groups,dc=bu-iddnwserver2,dc=IddLab,dc=local
Group Users : []
For example, to specify a user who is named patrick on a host that is named jupiter, enter this line in the Users attribute:
user=patrick,host=jupiter or user=patrick,host=jupiter.emc.com
NOTE: The formats user@host, host and user, and similar formats are ambiguous as to whether host or domain is
intended. It is recommended that you use the name=value format.
This example shows what to enter to provide NetWorker administrative privileges to the following:
In the Users field, type the following information:
● The user root from any host.
● The user operator from the hosts mars and jupiter .
● Any users, valid hosts for the users, and valid domains for the users and host that are included in the netgroup
netadmins. For example:
user=root
user=operator,host=jupiter
user=operator,host=mars.emc.com
&netadmins
Consider the following information:
● If the value has spaces, then surround the value in quotation marks, for example: domain="Domain Admins"
● When you specify a netgroup name, precede the name with an ampersand (&).
nsrlogin [-s NetWorker_server] [-H authentication_host] [-P port] [-t tenant] [-d domain]
[-p password] [-f] [-u user]
where:
● -s NetWorker_server—Specifies the name of the NetWorker Server. Use this option when you use the nsrlogin
command on a NetWorker host that is not the NetWorker Server.
● -H authentication_host—Specifies the name of the NetWorker Authentication Service host. Use this option when
you use the nsrlogin command on a NetWorker host that is not the NetWorker Server. This option is only required
when you do not use the -s option.
● -P port—Specifies the NetWorker Authentication Service port number. Use this option when you do not use the -s
option and when the NetWorker Authentication Service does not use the default port number 9090 for communications.
● -t tenant— Specifies the tenant name that the NetWorker Authentication Service should use to verify the username
and password. When you omit this option, NetWorker Authentication Service uses the Default tenant to verify the user
credentials.
● -d logindomain—Specifies the domain name that the NetWorker Authentication Service should use to verify
the username and password with an external authentication authority. When you omit this option, the NetWorker
Authentication Service uses the local user database to verify the user credentials.
● -f— Allows nsrlogin to be run as a root user.
● -u username—Specifies the username that the NetWorker Authentication Service should validate to generate a token.
The user string might be a username, email address, or another string, depending on configuration of the identity
provider. After successful authentication, the banner is displayed on the screen with a prompt to accept or reject the
banner. If the user enters yes, the user can proceed. Otherwise, the user is logged out.
NOTE: The banner content is empty by default. If banner content is empty, the confirmation prompt does not
appear.
● -p "password"—Specifies the password to send to the identity provider to verify the user. If this argument is not
provided, nsrlogin prompts the user to specify the password. If the password contains special characters, the password
must be enclosed in double quote marks (""). After successful authentication, the banner is displayed on the screen.
For example, to generate a token for user Konstantin in the idddomain domain and the idd tenant, type the following
command:
If the /nsr/authc-server/conf/banner.txt is updated with content, the banner content is displayed on successful
authentication.
Log in to the NetWorker server with username Konstantin, which is defined in the local user directory with the password
1.Password. When you enter Yes at the prompt, the banner content is accepted and you can proceed. When you enter
No at the prompt, the banner content is rejected and user is logged out.
nsrlogin -u Konstantin
Enter the password: <password>
Authentication succeeded
<Banner Content>
Do you wish to accept and continue (Yes/No)? Yes
When the NetWorker Authentication Service successfully validates the user, the service issues an authentication token to
the requesting host.
2. At the command prompt, type the NetWorker command.
If the validated user does not have the appropriate privileges to run the command, an error message appears or the
command does not return the expected result. For example, when you try to perform an operation with a user account that
does not have the required privilege, a message similar to the following appears:
Permission denied, user must have the 'Operate NetWorker' privilege'.
The CLI command uses the authenticated token, until the token expires. By default the token expiration period is 480 minutes
or 8 hours. When the token expires and the user tries to run a CLI command, the command fails with a permissions error and a
message similar to the following appears to indicate that the token has expired:
Security token has expired
To resolve this issue, run the nsrlogin command again to generate a new authenticated token.
NOTE: To revoke the user token and enable the CLI commands to use the Users attribute in the Usergroups resources
to authenticate users, use the nsrlogout command. The nsrlogout UNIX man page and the NetWorker Command
Reference Guide provides detailed information about the nsrlogout command.
Insufficient permissions
This message is displayed when the user that you used to log in to the NMC server is a member of many operating system
groups and you try to perform NetWorker operations.
When a user belongs to many groups, the total number of characters in the group names can exceed the buffer size that
NetWorker allots for the group names. NetWorker excludes characters and group names that exceed the buffer size.
To resolve this issue, edit the Usergroup resource to which the user belongs, and then specify the DN for the user in the
External Roles field.
Unable to connect to server: Unable to set user privileges based on user token for SYSTEM:
security token has expired
This message is displayed when the NetWorker Administration window is open and the token expires for the authenticated
user.
To resolve this issue:
1. Click OK. The NetWorker Administration window closes.
2. In the Console GUI, select the NetWorker server, and then select Launch NetWorker Administration. The Enter
Credentials window is displayed.
3. In the Enter Credentials window, specify the password of the user, and then click OK. The NetWorker Authentication
Service validates the user credentials and if the validation succeeds, generates a new token for the session.
nsradmin -p nsrexec
p type: nsr peer information; name: nmc-server-name
delete
yes
nsradmin -p nsrexec
p type: nsr peer information; name: nmc-server-name
delete
yes
NOTE: The hostname is case sensitive. You must use the hostname that is displayed in the NMC console.
If the issue persists, then run the following command on the NetWorker Server:
where:
● The location of the nsrauthtrust command differs on Linux and Windows:
○ Linux—/usr/sbin
○ Windows—C:\Program Files\EMC NetWorker\nsr
● Authentication_service_host is the hostname of the NetWorker Server that authenticates the NMC Server host.
● Authentication_service_port_number is the port number used by the NetWorker Authentication Service. The default port
number is 9090.
For example:
nsrauthtrust -H nwserver.corp.com -P 9090
6. Grant the NetWorker Authentication Service user groups access to the NetWorker Server, by typing the nsraddadmin
command:
nsraddadmin -H Authentication_service_host -P Authentication_service_port_number
For example:
nsraddadmin -H nwserver.corp.com -P 9090
NOTE: The NetWorker Management Web UI uses the NetWorker credentials for authentication.
Component authentication
NetWorker hosts and daemons use the nsrauth mechanism to authenticate components and users, and to verify hosts. The
nsrauth GSS authentication mechanism is a strong authentication that is based on the Secure Sockets Layer (SSL) protocol.
NOTE: HP-UX depends on the OpenSSL library available on the operating system. OpenSSL 0.9.8e or later is required for
NetWorker modules to function correctly.
Following version SSLv3, SSL was renamed to Transport Security Layer (TLS) starting with TLSv1. For Windows, nsrauth uses
the SSL/TLS protocol that is implemented by RSA BSAFE. For UNIX and Linux, nsrauth uses the SSL/TLS protocol that is
implemented by the OpenSSL library. NetWorker 9.1 and later uses TLSv1.2. Earlier NetWorker versions that have not been
updated use TLSv1.0.
The nsrexecd service on each NetWorker host provides the component authentication services. The first time the nsrexecd
process starts on a host, the process creates the following unique credentials for the host:
● 2048-bit RSA private key
where:
● IP_Address[mask] is a single IP address, a single host name, or an IP address and netmask range. You can specify the
number of bits for the mask value or use the full subnet mask address.
● authentication_method is nsrauth for strong authentication or oldauth for legacy authentication. We recommend you to
use nsrauth as the authentication method.
NOTE: When you specify more than one authentication method, NetWorker attempts to communicate with the first
method in the list. If the first method fails, then NetWorker will attempt to communicate by using the second method
in the list.
For example:
● To configure host mnd.emc.com to only use nsrauth when communicating with the host, type:
mnd.emc.com,nsrauth
● To configure all hosts on the 137.69.168.0 subnet to only use nsrauth when communicating with the host, type:
137.69.160.0/24, nsrauth
● To configure all hosts in the datazone to use nsrauth when communicating with the host except for a host with the IP
address 137.69.160.10, which should try oldauth first, type the following two lines:
137.69.160.10, oldauth/nsrauth
0.0.0.0, nsrauth
4. Click OK.
5. On the target host, restart the NetWorker services or daemons.
Where:
● IP_Address[mask] is a single IP address, a single host name, or an IP address and netmask range. You can specify the
number of bits for the mask value or use the full subnet mask address.
● authentication_method is nsrauth for strong authentication or oldauth for legacy authentication. We recommend you to
use nsrauth as the authentication method.
NOTE: When you specify more than one authentication method, NetWorker attempts to communicate with the first
method in the list. If the first method fails, then NetWorker will attempt to communicate by using the second method
in the list.
For example:
● To configure host mnd.emc.com to use the nsrauth when communicating with the host, type:
update auth methods: "mnd.emc.com,nsrauth"
● To configure all hosts on the 137.69.168.0 subnet to use the nsrauth when communicating with the host, type:
update auth methods: 137.69.160.0/24,nsrauth
● To configure all hosts in the datazone to use the nsrauth when communicating with the host except for a host with the
IP address 137.69.160.10 which should try oldauth first, type the following two lines:
update auth methods: 137.69.160.10,oldauth/nsrauth 0.0.0.0,nsrauth
NOTE: If it does not find a match, it uses the default value 0.0.0.0/0,nsrauth.
5. On the target host, restart the NetWorker services or daemons.
3. Configure the NW instance info operations attribute and the NW instance info file attribute to export the resource
information:
update "NW instance info operations: export", "NW instance info file: pathname_filename"
For example, to export the information to the /home/root/export.txt file on a UNIX host, type:
For Windows paths, use a forward slash (/) when you specify the path.
For example, when the mnd_credentials.txt file is in c:\users, specify: c:/users/mnd_credentials.txt.
NetWorker exports the local host credential information to the file you specify, on the target host.
nwinstcreate -ix
2. On the Enter the file name to save NetWorker identify information into prompt, specify the name of
the file to save the custom certificate and private key or accept the default file name and location.
3. On the Enter a unique NetWorker instance name to identify your machine prompt, specify an instance
name or accept the default value (hostname of the machine).
NetWorker uses the specified value in the my hostname attribute by default.
4. On the Enter the NetWorker instance id prompt, specify a unique value to identify the host or accept the default
value.
5. On the Enter the file containing the private key prompt, specify the path and file name of a PEM
formatted file that contains the private key for this host. If the organization does not have a private key, leave the prompt
blank and NetWorker generates the private key for the host.
6. On Windows hosts only, ensure that the Windows Local System Account (System) has read, write, and modify privileges for
the file that contains the custom certificate and key.
7. Click OK.
5. Configure the NW instance info operations attribute and the NW instance info file attribute to import the resource
information:
update NW instance info operations: import; NW instance info file: pathname_filename
For example, to export the information to the /home/root/mnd_credentials.txt file on a UNIX host, type:
For Windows paths, use a forward slash (/) when you specify the path.For example, when the mnd_credentials.txt file
is in c:\users, specify: c:/users/mnd_credentials.txt.
For example, when the mnd_credentials.txt file is in c:\users, specify: c:/users/mnd_credentials.txt.
quit
where:
● hostname is value that appears in the Name attribute in the credential file.
● NW_instance_id is the value that appears in the NW Instance ID attribute in the credential file.
● my_hostname is the value that appears in the My hostname attribute in the credential file.
4. When prompted to create the resource, type Yes.
5. Set the current query to the new NSR Peer Information resource:
. type: NSR Peer Information; name: hostname
6. Update the new NSR Peer Information resource to use the exported certificate:
update: change certificate: load certificate from file; certificate file to load:
pathname_filname
For Windows paths, use a forward slash (/) when you specify the path. For example, when the mnd_credentials.txt
file is in c:\users, specify: c:/users/mnd_credentials.txt.
7. When prompted to update the resource, type Yes.
8. Display the hidden properties:
option hidden
The Certificate window displays a list of NSR Peer Information resources stored in the nsrexec database on the host.
3. In the Certificate pane, right-click the certificate that you want to delete, and then select Delete.
4. When prompted to confirm the delete operation, select Yes.
If you receive the error, User username on machine hostname is not on administrator list, you cannot
modify the resource until you configure the NSRLA access privileges on the target host. The section "Configuring NSRLA
access privileges" provides more information.
The target host creates a NSR Peer Information resource for the initiating host the next time that the initiating host attempts to
establish a connection with the target host.
2. Set the query type to the NSR Peer Information resource of the initiating host:
. type: nsr peer information;name:initiating_host_name
4. Print the attributes for the NSR Peer Information resource and confirm that the name and peer hostname attributes
match the hostname of the initiating host:
print
quit
The target host creates a NSR Peer Information resource for the initiating host the next time that the initiating host attempts to
establish a connection with the target host.
Resolving conflicts between the local host credentials and NSR Peer
Information resource
After two NetWorker hosts successfully authenticate each other, the target host creates an NSR Peer Information resource
to store the local host credentials of the initiating host. The target host uses attributes that are stored in the NSR Peer
Information resource to validate connection requests from the target host. When unexpected data loss or corruption occurs in
the NSRLA resource of the initiating host, the nsrexecd process creates new local host credentials. When a host with new local
host credentials attempts to connect another host, the target host rejects the connection request if an NSR Peer Information
resource exists for the initiating host because the credentials do not match the contents of the NSR Peer Information resource.
When the local host credentials change for a host, all target hosts that have had a prior connection with the host rejects a
connection attempt. To resolve this issue, type the following command to remove NSR Peer Information resources from the
nsrexec database:
nsradmin -s NetWorker_server -p nsrexec -C -y "NSR peer information"
where you specify the -s NetWorker_server option when you type the command from the target host.
Alternately, perform the following steps:
● Manually delete the NSR Peer Information resource for the initiating host in the NetWorker client database of each target
host.
NOTE: If the NetWorker server is the initiating host, delete the NSR Peer Information resource on each host in the
datazone.
● Import a backup copy of the local host credentials on the initiating host.
2. Set the query type to the NSR Peer Information resource of the initiating host:
. type: nsr peer information;name:initiating_host_name
4. Print the attributes for the NSR Peer Information resource and confirm that the name and peer hostname attributes
match the hostname of the initiating host:
print
5. Update the new NSR Peer Information resource to use the exported certificate:
update: change certificate: load certificate from file; certificate file to load:
pathname_filname
For Windows paths, use a forward slash (/) when you specify the path. For example, when the mnd_credentials.txt
file is in c:\users, specify: c:/users/mnd_credentials.txt.
6. When prompted to update the resource, type Yes.
7. Display the hidden properties:
option hidden
Component authorization
NetWorker provides you with the ability to restrict remote program executions or client-tasking rights on a NetWorker host.
You can also:
Remote directed recovery Add the FQDN or shortname of the administering client to the servers file on the
destination client.
NDMP DSA backup Add the FQDN or shortname of the NetWorker client that starts the backup.
NOTE: For NDMP, the servers file resides in the NetWorker Server.
NOTE: Before adding the FQDN or shortname to the NetWorker server file, ensure that the hostname resolution for FQDN
or short name is working correctly.
The software installation process on Windows and Solaris allows you to specify a list of hosts to add to the servers file.
To change the servers file after the installation completes or to specify hosts on operating systems that do not allow you to
configure the file during the installation process, use a text editor to edit the servers file. The servers file resides in the
following locations:
● On UNIX and Mac NetWorker hosts:/nsr/res
● On Windows NetWorker hosts:NetWorker_installation_path\res
When you add a NetWorker host to the servers file, ensure that you perform the following tasks:
● Specify the FQDN or shortname for the host.
● Specify one hostname on each line.
● Restart the nsrexecd service on the host, after you save the file.
NOTE: If the servers file is empty or does not exist, then any NetWorker host has client-tasking rights to the host. So, it
is recommended to update the servers file as suggested above.
NOTE: If you are unsure of your NetWorker server's hostname or IP address, it is recommended that you update the
servers file with the local hostname or IP address.
On UNIX systems, you can start the nsrexecd daemon with the -s servername option to assign client-tasking rights to a host.
The use of the -s option to start the nsrexecd daemon supersedes the use of the servers files to restrict client-tasking rights.
5. Click OK.
NOTE: Only .cer file format is supported for the certificate file.
openssl pkcs12 -export -in <server certificate filename> -inkey <server key filename>
-name emcauthcsaml -out server.p12
5. Check the permissions of the .crt and .key file. It must be 0600. "Other" and "group" must not have any permission.
6. Search for ssl_cert_file and ssl_cert_key in the postgresql.conf file.
7. Replace the server.crt and server.key files with the CA signed certificate filenames.
8. Start the NWUI services.
Windows:
● C:\Program Files\EMC
NetWorker\nsr\logs\client_fix
● C:\Program Files\EMC
NetWorker\nsr\logs\client_fix.ra
w
Windows:
C:\Program Files\EMC
NetWorker\nsr\logs\messages
NetWorker Log file name and location that is defined by the UNIX only, OS log file.
Servergenerated syslog system log configuration file. NOTE: NetWorker does not modify
the syslog.conf file to configure
messages
local0.notice and local0.notice and local0.alert.
local0.alert Vendor specific documentation describes
82 Log Settings
Table 10. NetWorker Server log files (continued)
Component File name and default location Description
Index log UNIX: Contains warnings about the size of the client file
index and low disk space on the file system that
/nsr/logs/index.log contains the index files. By default, the Index
size notification on the NetWorker Server sends
Windows: information to the log file.
C:\Program Files\EMC
NetWorker\nsr\logs\index.log
Windows:
C:\Program Files\EMC
NetWorker\nsr\logs\hyperv-flr-
ui\hyperv-flr-ui.log
Windows:
C:\Program Files\EMC
NetWorker\nsr\logs\Policy\VMware_pro
tection_policy_name
Policies UNIX: Contains completion information about VMware
Protection Policies. By default, the VMware
/nsr/logs/policy.log Protection Policy Failure notification on the
NetWorker Server sends information to the log
Windows: file.
C:\Program Files\EMC
NetWorker\nsr\logs\policy.log
Log Settings 83
Table 10. NetWorker Server log files (continued)
Component File name and default location Description
C:\Program Files\EMC Installation Guide provides more information
NetWorker\nsr\logs\migration about all the migration log files.
Media management UNIX: Contains device related messages. By default,
the device notifications on the NetWorker
/nsr/logs/media.log Server send device related messages to the
media.log file on the NetWorker Server and
Windows: each Storage Node.
C:\Program Files\EMC
NetWorker\nsr\logs\media.log
Windows:
C:\Program Files\EMC
NetWorker\nsr\logs\recover\recover_co
nfig_name_YYYYMMDDHHMMSS
Package Manager log UNIX: Contains information that is related to the
Package Manager and the nsrpush command.
/nsr/logs/nsrcpd.raw Use the nsr_render_log program to view the
contents of the log file.
Windows:
C:\Program Files\EMC
NetWorker\logs\nsrcpd.raw
Windows:
C:\Program Files\EMC
NetWorker\logs\rap.log
/nsr/logs/
NetWorker_server_sec_audit.raw
Windows:
C:\Program Files\EMC
NetWorker\logs\Networker_server_sec
_audit.raw
84 Log Settings
Table 11. NMC server log files (continued)
Component File name and default location Description
Windows:
C:\Program Files\EMC
NetWorker\Management\logs\gstd.raw
NMC server database Linux: Contains the results of the NMC server database
conversion conversion that is performed during an upgrade
/opt/lgtonmc/logs/gstdbupgrade.log operation.
Windows:
C:\Program Files\EMC
NetWorker\Management\logs\gstdbupgr
ade.log
NMC web server Linux: Contains messages for the embedded Apache
httpd web server on the NMC server.
/opt/lgtonmc/management/logs/
web_output
Windows:
C:\Program Files\EMC
NetWorker\Management\logs\web_outpu
t
Windows:
C:\Program Files\EMC
NetWorker\Management\nmcdb\pgdata\d
b_output
Log Settings 85
Table 12. Client log files (continued)
Component File name and default location Description
Windows Bare Metal Recovery (BMR) The following files in the X:\Program Contains the recovery workflow of
Files\EMC NetWorker\nsr\logs\ the DISASTER_RECOVERY:\ and any
directory: errors that are related to recovering the
save set files or Windows ASR writer
ossr_director.raw errors. Use the nsr_render_log
program to view the contents of the log
file.
N/A recover.log Contains the output that is generated by
the NetWorker recover.exe program
and error messages that are related to
critical volume data recovery.
N/A winPE_wizard.log Contains workflow information that is
related to the NetWorker BMR wizard
user interface.
N/A winpe_nw_support.raw Contains output from the
winpe_nw_support.dll library.
The output provides information
about communications between the
NetWorker BMR wizard and the
NetWorker Server.
Use the nsr_render_log program to
view the
contents of the log file.
CloudBoost - CloudBoost Appliance The following log files in the /nsr/logs/ These files appear on the CloudBoost
cloudboost directory: appliance and contain information about
86 Log Settings
Table 12. Client log files (continued)
Component File name and default location Description
Log Settings 87
○ -m suppresses the message ID
○ -e suppresses the error number
○ -a suppresses the activity ID
○ -p suppresses the process ID
○ -t suppresses the thread ID
○ -h suppresses the hostname
○ -y suppresses the message severity
● To render a .raw file from a remote machine, type: nsr_render_log -c -empathy -R hostname raw_filename
1>output_filename 2>&1
where:
○ hostname is the name of the host that contains the .raw file.
○ raw_filename is the name of the unrendered file. For example, daemon.raw
○ output_filename is the name of the file to direct the output to
○ -c suppresses the category
○ -e suppresses the error number
○ -m suppresses the message ID
○ -p suppresses the process ID
○ -a suppresses the activity ID
○ -t suppresses the thread ID
○ -h suppresses the hostname
○ -y suppresses the message severity
● To render a .raw file and only view log file messages for a specific device, type: nsr_render_log -c -empathy -F
devicename raw_filename 1>output_filename 2>&1
where devicename is the name of the device.
● To render only the most recently logged messages, type: nsr_render_log -c -empathy -B number
raw_filename 1>output_filename 2>&1
where number is the number of lines that you want to render.
The NetWorker Command Reference Guide provides detailed information about the nsr_render_log program and the
available options.
● To render a .raw file and only view certain messages severities, type: nsr_render_log -c -empath -Y
message_severity 1>output_filename 2>&1
where message_severity is one of the severity types listed in the following table.
The UNIX man page and the NetWorker Command Reference Guide provides detailed information about the
nsr_render_log program and the available options.
88 Log Settings
Rendering raw log files at runtime
You can instruct the NetWorker software to render the daemon.raw and gstd.raw files into the locale of the host at
runtime, in addition to creating locale-independent log files. This allows you to view the log file in a text editor without using the
nsr_render_log program to render the file first.
Log in to the NetWorker host with the root (UNIX) or Administrator (Windows) user account.
To instruct the NetWorker software to render logs in the locale of the computer hosting the file, set the runtime rendered
log file attribute in the NSRLA database. For backward compatibility with previous releases of the NetWorker software, runtime
rendered log files contain the following attributes:
● Message ID
● Date and time of message
● Rendered message
1. To access the NSRLA database, from a command prompt, use the nsradmin program:
nsradmin -p nsrexec
For example, on a Windows NMC server, output similar to the following appears:
nsradmin> print
type: NSR log;
administrator: Administrators,
"group=Administrators,host=bu-iddnwserver.iddlab.local";
owner: NMC Log File;
maximum size MB: 500;
maximum versions: 10;
runtime rendered log: ;
runtime rollover by size: Disabled;
runtime rollover by time: ;
name: gstd.raw;
log path: \
"C:\\Program Files\\EMC NetWorker\\Management\\GST\\logs\\gstd.raw";
5. To define the path and file name for the rendered log file, use the Runtime rendered log attribute.
For example, to save rendered messages to the file rendered.log in the default NetWorker logs directory on a Windows
host, type:
Log Settings 89
update runtime rendered log: "C:\\Program Files\\EMC NetWorker\\nsr\\logs\\rendered.log"
Table 14. Raw log file attributes that manage log file size
Attribute Information
Maximum size MB Defines the maximum size of the log files.
Default: 500 MB
The accepted range for the attribute is 10 MB to 4000 MB. Starting with
NetWorker 19.9, for upgrade scenarios, if the value is less than 10 MB, the value 10
is considered.
Maximum versions Defines the maximum number of the saved log files.
When the number of copied log files reaches the maximum version value,
NetWorker removes the oldest log when a new copy of the log file is created.
Default: 10
Runtime rollover by size When set, this attribute invokes an automatic hourly check of the log file size.
Default: disabled
90 Log Settings
Table 14. Raw log file attributes that manage log file size (continued)
Attribute Information
Runtime rollover by time When set, this attribute runs an automatic trimming of the log file at the
defined time, regardless of the size. The accepted formats for the variable are:
HH:MM (hour:minute), day
in the week (Sunday to Saturday), and N day every month (N must be
in the range 1-31). The rollover based on the day in the week and the day in
the month happens in the first hour of the appropriate day.
When you configure the runtime rendered log attribute, NetWorker trims the
runtime rendered log file and the associated .raw file simultaneously.
Default: undefined
NOTE: After setting this attribute, restart NetWorker services for the change
to take effect.
How the trimming mechanism trims the log files differs depending on how you define the log file size management attributes.
The following table summarizes the trimming behavior.
Table 15. Raw log file attributes that manage the log file trimming mechanism
Attribute configuration Trimming behavior
When you configure runtime rollover by time or runtime ● NetWorker copies the contents of the existing
rollover by size log file to a new file with the naming
convention:daemondate_time.raw
● NetWorker truncates the existing daemon.raw to 0 MB.
NOTE: When this mechanism starts on a NetWorker
Server that is under a heavy load, this process may take
some time to complete.
When you do not configure runtime rollover by time or runtime ● NetWorker checks the log file size when the nsrexecd
rollover by size process starts on the computer.
● When the log file size exceeds the size that is defined by
the maximum size MB attribute, NetWorker renames the
existing log file to log_file_name_date_time.raw
then creates a new empty log file.
NOTE: When the nsrd daemon or NetWorker Backup
and Recover Server service runs for a long time, the size
of the log file can become much larger than the value
defined by maximum size MB.
Managing raw log file size for the daemon.raw, networkr.raw, and gstd.raw
files
To configure the NetWorker software to rollover the .raw file by time, perform the following steps.
1. Log in to the NetWorker host with root on UNIX or Administrator on Windows.
2. To access the NSRLA database, use the nsradmin program:
nsradmin -p nsrexec
Log Settings 91
For example, on a Windows NMC server, output similar to the following appears:
nsradmin> print
type: NSR log;
administrator: Administrators,
"group=Administrators,host=bu-iddnwserver.iddlab.local";
owner: NMC Log File;
maximum size MB: 500;
maximum versions: 10;
runtime rendered log: ;
runtime rollover by size: Disabled;
runtime rollover by time: ;
name: gstd.raw;
log path: \
"C:\\Program Files\\EMC NetWorker\\Management\\GST\\logs\\gstd.raw";
6. Update the runtime rollover by time attribute with the time that you want to rollover the log file.
For example:
● To configure the gstd.raw file to rollover at 12:34 AM, type:
92 Log Settings
Monitoring changes to the NetWorker server resources
The Monitor RAP (resource allocation protocol) attribute in the NSR resource enables you to track configuration modifications
to the NetWorker server resources and attributes. The NetWorker server records these changes in the rap.log file, which is
located in the NetWorker_install_dir\logs directory. Each entry in the rap.log file consists of the user action, the
name of the user that performed the action, the name of the source computer, and the time of the change. NetWorker logs
sufficient information in the rap.log file to enable an administrator to undo any changes. The Monitor RAP attribute is enabled
by default. To disable the attribute setting, perform the following steps.
Use NMC to connect to the NetWorker server with a user that is a member of the Application Administrators or Database
Administrators user group.
NOTE: In NetWorker 8.0 and later, the Security Audit Log feature provides the NetWorker server and the NMC server with
the ability to log specific security audit events that are related to their operations.
1. From the Administration window, select Server.
2. From the View menu, select Diagnostic mode.
3. Right-click the NetWorker server name in the left navigation pane, and then select Properties.
4. On the General tab, select the Disabled button for the Monitor RAP attribute.
Log Settings 93
/sbin/init.d/networker start
● On AIX, type:
/etc/rc.nsr
94 Log Settings
Starting the NMC server daemon in troubleshoot mode using environment variables
Use environment variable to put the gstd daemon in troubleshoot mode when you cannot access the NMC GUI.
then
/etc/init.d/gst start
● AIX: Type:
/etc/rc.gst start
then
/etc/rc.gst stop
Log Settings 95
NOTE: If you do not see the PID for each process on the Process tab, browse to View > Select Columns, and
then select PID (Process Identifier)
● On UNIX, use the ps command. For example, to get a list of all the NetWorker processes that start with nsr, type ps
-ef | grep nsr.
2. From a command prompt, type:
dbgcommand -p PID -Debug= x
where:
● PID is the process id of the process.
● x is a number between 0 and 9.
NOTE: 0 turns off troubleshoot.
1>filename
2>&1
where:
● x is a number between 1 and 99.
● file_sytem_objects is the name of the files or directory to backup.
● filename is the name of the file that stores the troubleshoot information.
NOTE: The NetWorker Command Reference Guide provides detailed information about all the available backup options and
how to use the save command.
96 Log Settings
Running Recoveries in troubleshoot mode
You can configure NetWorker to log verbose output for recoveries when you Recovery wizard, perform Windows disaster
recoveries and by using the recover command.
2. To create or modify the recover job, use the Recovery wizard. On the Select the Recovery Options window, select
Advanced Options.
3. In the Debug level attribute, select a troubleshooting level between 0 and 9.
4. Complete the remaining steps in the Recovery Wizard.
NetWorker logs the troubleshoot recovery information to the recover log file.
where:
● nw_server.corp.com is the name of the NetWorker server.
● mnd.corp.com is the name of the source NetWorker client.
3. Confirm that the nsrd process can schedule the recover job:
Log Settings 97
a. Update the Recover resource to start the recover job:
update: name: recover_resource_name ;start time: now
where recover_resource_name is the name of the Recover resource.
b. Exit the nsradmin application
c. Confirm that the nsrtask process starts.
If the nsrtask process does not start, the review the daemon.raw file on the NetWorker server for errors.
4. To confirm that the NetWorker server can run the recover command on the remote host, on the NetWorker server type
the following command:
Where jobid is the jobid of the Recover job that you want to review.
NOTE: Review the daemon.raw file on the NetWorker server to obtain the jobid for the recovery operation.
98 Log Settings
Figure 14. WinPE registry key to troubleshoot recoveries
where:
● x is a number between 1 and 99.
● file_sytem_objects is the name of the files or directory to recover.
● filename is the name of the file that stores the troubleshoot information.
NOTE: The NetWorker Command Reference Guide provides detailed information about all the available recovery options
and how to use the recover command.
Log Settings 99
NetWorker Authentication Service logs
This section provides an overview of the log files that are available for the NetWorker Authentication Service.
Windows:
C:\Program Files\EMC
NetWorker\nsr\authc\tomcat\logs\authc-server.log
Refer to the Apache website for detailed information about the Apache Tomcat log files.
Modifying the The rootLogger.level= attribute defines the level of logging that the NetWorker Authentication Service
logging level writes to the log files and where the messages appear. By default, the NetWorker Authentication Service
sets the logging level to warn and messages appear in the log files, stdout, and in the Java application,
There are five standard log levels: debug, info, warn, error, and fatal.
To change the logging level to error, modify the rootLogger.level= attribute to appear as follows:
rootLogger.level=error
Modifying the The appender.app.policies.size.size attribute defines the maximum size of the authc-server.log file.
maximum log file When the log file reaches the maximum size, NetWorker Authentication Service renames the log file for
size archival purposes and creates log file. By default, NetWorker Authentication Service sets the maximum
size to 2000 KB.
To increase the size of the log file to 5 MB, modify the appender.app.policies.size.size attribute to appear
as follows: appender.app.policies.size.size=5MB
Modifying the The appender.app.strategy.max attribute defines the number of authc-server.log rollover log files
number of that the NetWorker Authentication Service maintains. When the size of the authc-server.log
rollover log files reaches the maximum file size value, NetWorker Authentication Service copies the contents of the log file
to a new log file with the naming convention authc-server-incrementalNumber.log. By default,
NetWorker Authentication Service maintains 10 rollover log files.
To increase the number of rollover log files by 4, modify the appender.app.strategy.max attribute to
appear as follows: appender.app.strategy.max=14
Modifying the The rootLogger.level= attribute defines the level of logging that the NetWorker Authentication Service
logging level writes to the log files and where the messages appear. By default, the NetWorker Authentication Service
sets the logging level to warn and messages appear in the log files, stdout, and in the Java application,
There are five standard log levels: debug, info, warn, error, and fatal.
To change the logging level to error, modify the rootLogger.level= attribute to appear as follows:
rootLogger.level=error
Modifying the The appender.app.policies.size.size attribute defines the maximum size of the authc-cli.log file.
maximum log file When the log file reaches the maximum size, NetWorker Authentication Service renames the log file for
size archival purposes and creates a log file. By default, NetWorker Authentication Service sets the maximum
size to 100 KB.
To increase the size of the log file to 2 MB, modify the appender.app.policies.size.size attribute to appear
as follows: appender.app.policies.size.size=2MB
To modify how NetWorker REST API manages the restapi.log log file, edit the logback.xml file, which is found in the
following locations:
● Linux: /nsr/authc/webapps/nwrestapi/WEB-INF/classes
● Windows: C:\Program Files\EMC NetWorker\nsr\authc-server\tomcat\webapps\nwrestapi\WEB-
INF\classes
This section describes how to modify the commonly used log attributes in the logback.xml file. Logback project documentation
provides more detailed information about each attribute in the logback.xml file.
<fileNamePattern>${logdir}/restapi_%d.log</fileNamePattern>
<filter>
<filter-name>apiProtection</filter-name>
<filter-class>com.emc.nw.comm.WebApiSecurityFilter</filter-class>
<init-param>
<param-name>allowHead</param-name>
<param-value>true</param-value>
</init-param>
</filter>
To disable the HEAD method for REST API calls, change the <param-value> associated with the allowHead parameter
from true to false.
<filter>
<filter-name>apiProtection</filter-name>
<filter-class>com.emc.nw.comm.WebApiSecurityFilter</filter-class>
<init-param>
<param-name>allowHead</param-name>
<param-value>false</param-value>
</init-param>
</filter>
● The CloudBoost appliance has a pre-configured NetWorker storage node. For a single CloudBoost device, open a minimum of
six ports on the CloudBoost appliance. You can further expand the port range based on the deployment type and the number
of CloudBoost devices configured. The "Communication Security Settings" chapter provides additional information.
● Starting with Red Hat Enterprise Linux 7, the cockpit package provides a web console for system administration. The cockpit
package uses 9090 as the default port to run its service. Since the NetWorker authentication service also runs on the port
Service ports
The service ports are also known as inbound, destination, or listening ports. The TCP server processes that run on each
NetWorker host use service ports to listen for inbound connections. The service ports are meant to provide specific services on
the ports that are reserved for them.
NetWorker uses two types of service ports:
● Fixed ports—NetWorker uses two fixed ports: TCP/7937 and TCP/7938. Include these ports in the service port range of
each NetWorker host. NetWorker uses these ports to start connections.
● Variable ports—NetWorker dynamically opens ports. A NetWorker host can allocate any port in the defined service port
range and the NetWorker daemons select the dynamic ports within that range randomly. The default range is 7937-9936 and
you can narrow or expand this range.
To increase security in the environment, reduce the variable ports range to specify only the minimum number of service
ports that the NetWorker software requires. The minimum value depends on the installation type and the number of hosted
NetWorker devices. NetWorker stores the service port range for a host in the NSR Local Agent (NSRLA) resource in the
NetWorker client database (nsrexec). The service ports can be modified using the nsrports command.
Connection ports
Connection ports are also known as outbound ports, source ports, or communication ports. NetWorker processes use
connection ports to connect to a service. The NetWorker software requires one connection port for any type of communication
between the client, storage node, and server.
NetWorker uses a default range, 0-0, to indicate that the NetWorker software allows the operating system to select the port for
TCP clients. Port 0-0 indicates that any available port from the operating system can be used for outbound communication. The
operating system reserves connection ports for short-term use and reuses the ports as needed. The operating system might
allow you to configure the dynamic port range, for example, by using the netsh program on Windows. NetWorker does not
require changes to this range and it is recommended that you use the default dynamic port range.
The use of the default port range does not cause security concerns. It is recommended that you do not change the range for
any NetWorker hosts in the datazone. NetWorker performance problems or random malfunctions can occur when the range is
too narrow. The connection ports can be modified using the nsrports command.
NOTE: If the firewall time out is shorter than the common 1 hour value, further decrease these values. The network
overhead as a result of enabling TCP KeepAlive is minimal.
The following table summarizes the Wait Time Before Probing and Interval Between Retry Probes parameters
for each operating system.
# no -o tcp_keepintvl = 6840
where the TCP parameter value is defined in
half-seconds.
Solaris # ndd -set /dev/tcp Add the ndd commands to the /etc/rc2.d/
tcp_time_wait_interval 3420000 S69inet file.
HKLM\System\CurrentControlSet\Servi
ces\Tcpip\Parameters\KeepAliveInter
val
DWORD=3420000
The following table summarizes the port requirements specific to the storage node programs.
NOTE: In enterprise environments that require the restriction of unattended firewall ports for security reasons, configure
the storage node attributes mmds for disabled devices and Dynamic nsrmmds unselected (static mode) to prevent a
listener from starting an inactive nsrmmd port. The NetWorker Administration Guide provides more information.
To accommodate growth in the environment and the addition of new devices, allocate extra service ports for the NetWorker
server.
NOTE: The Software Configuration wizard requires one service port. The port is dynamic and closes when the wizard
closes. If you use the Software Configuration wizard, add one additional port to the service port range.
The following table summarizes the port requirements specific to the Server programs.
NOTE: If you restrict unattended firewall for security reasons, then use the storage node attributes mmds for disabled
devices and Dynamic nsrmmds unselected (static mode) to prevent a listener from starting on an inactive nsrmmd port.
For example, if you connect to the NMC server with the NMC administrator from the NMC client mnd.mydomain.com, type:
update administrator: *@localhost, [email protected]
Enabling updates of the NSR system port ranges resource describes how to provide user accounts with the ability to
modify the service port attribute.
● If you see accounts in the Administrators attribute, then update the Service ports attribute with the calculated
service port range. For multiple ranges, type one range per line.
4. In the Service ports attribute, specify the calculated service port range. For multiple ranges, type one range per line.
NOTE: It is recommended that you do not change the Connection ports attribute from the default value 0-0.
5. Click Ok.
6. On the NetWorker host, stop, and then start the NetWorker services or daemons.
For example, to modify the service port attribute in the NSR system port ranges resource on myclient.emc.com, perform the
following steps:
1. Display the current port range:
nsrports -s myclient.emc.com
2. Update the service port range. Separate multiple port ranges with a space. For example:
nsrports -s myclient.emc.com -S 7937-7938 7978-7979
NOTE: If you do not have permission to update the NSR system port ranges attribute, an error message
similar to the following appears: nsrexecd: User 'username' on machine 'hostname' is not on
'administrator' list. Enabling updates of the NSR system port ranges resource describes how to enable user
access to update the NSR system port ranges resource.
10000 (HTTP)
27001
192.167.10.101 client_A
192.167.10.102 client_B
192.167.10.103 client_C
192.167.10.104 client_D
192.167.10.105 client_E
192.167.10.106 client_F
196.167.10.124 storage_node_X
192.167.10.125 storage_node_Y
192.167.10.127 storage_node_Z
192.167.10.126 NW_server
This example requires you to only open service ports for the NetWorker Server on the firewall to allow inbound traffic. Calculate
the service port requirements for the NetWorker Server with this formula:
● The Service port attribute on each client specifies a minimum of four service ports, for example: 7937–7940.
NOTE: To simplify the configuration, configure each client to use the same four service port numbers.
● The firewall must allow outbound traffic, to the IP address of each NetWorker Client, on each of the service ports that are
defined in the Service port attribute on the NetWorker Client. Because each client can specify the same port numbers, the
firewall only needs to allow four ports for each client IP address. These port numbers can be a subset of the port numbers
that are used by the NetWorker Server, as in this example.
● In pseudo syntax, the firewall rule for the service ports would look like this:
Connection refused
This message appears when the NetWorker host cannot establish a portmapper connection on port 7938.
To resolve this issue, ensure that the NetWorker software can register an RPC portmapper connection on port 7938.
To resolve this issue, ensure that the firewall rules allow communication between the NMC server and NetWorker server on the
port that you configured for the NetWorker Authentication Service. The default port is 9090.
The NetWorker Administration Guide provides more information about NetWorker interoperability with EFS.
● Backup a client that sends data to an encryption-enabled cloud device. Backup speeds decrease because the encryption
functions occur twice.
6. Click OK.
Only users that you specify in the Users field can modify the Datazone pass phrase attribute in the NSR resource.
NOTE: Ensure to store the export file securely and remember the password as it must be provided during import.
● Import passphrase
To run the import:
1. Shut down the NetWorker server service before running import.
2. Provide the path to your previously exported file, and password that you set during export.
3. Type # ./nsr_prep_lb -v -i export.lb.
4. Enter the password.
The import file export.lb for XX lockboxes is successfully generated.
5. Restart the NetWorker server for the changes to take effect.
6. Start the NetWorker service and check if lockboxes files are accessible.
NetWorker clients running on Linux on PowerPC do not utilize FIPS compliant libraries.
In NetWorker on Linux, by default the FIPS mode is set to disabled. To enable FIPS mode operation on NetWorker on Linux,
create a file /nsr/debug/fipsenable, and restart NetWorker services. On Windows, NetWorker always utilizes FIPS
mode, and you cannot switch to non-FIPS mode.
The disablement of FIPS mode does not change the encryption algorithms that are used by NetWorker. The encryption
algorithms are consistent between FIPS and non-FIPS modes.
NetWorker Module for Databases and Applications (NMDA) for MySQL running on Linux does not utilize FIPS compliant
encryption libraries, and is not supported on Linux client platforms where FIPS mode is enabled.
Common Criteria
NetWorker 9.2 is certified for Common Criteria compliance. Common Criteria provides assurance that the process of
specification, implementation, and evaluation of a product has been conducted in a rigorous, standard, and repeatable manner at
a level that corresponds with the target environment for use. Common Criteria is a framework in which computer system users
can specify their security functional requirements and security assurance requirements.
Additional notes
● Session timeout—The NetWorker Management Web UI (NWUI) is configured with a fixed 15 minute inactivity time out.
● SNMP v3 is not supported.
NOTE: The Verify files feature is not available for NetWorker clients on UNIX.
Verify Files
Requesting 4 file(s), this may take a while...
Verify start time: 28/10/2013 3:46:36 PM
Requesting 1 recover session(s) from server.
91651:winworkr: Successfully established AFTD DFA session for recovering save-set ID
'4285011627'.
C:\data\mnd.raw
C:\data\pwd.txt
C:\data\lad.txt
2 Performs a level 1 check and checks the online file index for new and cancelled saves. Adds
new saves to the client file index, and removes cancelled saves.
3 Performs a level 2 check and reconciles the client file index with the media database. Removes
records that have no corresponding media save sets. Removes all empty subdirectories under
db6 directory.
4 Performs a level 3 check and checks the validity of the internal key files for a client file index.
Rebuilds any invalid key files.
5 Performs a level 4 check and verifies the digest of individual save times against the key files.
6 Performs a level 5 check and extracts each record from each save time, to verify that each
record can be extracted from the database. Re-computes the digest of each save time and
compares the results with the stored digest. Rebuilds internal key files.
The UNIX man page and the NetWorker Command Reference Guide provides detailed information about how to use the nsrck
command and the available options.
Single data zone: The NetWorker server hosts the nsrlogd daemon
By default, the nsrlogd daemon runs on the NetWorker server.
In this configuration, the nsrlogd daemon receives security audit messages from:
● The gstd and nsrexecd processes on the NMC server.
● The nsrexecd process on each NetWorker client in the data zone.
● The daemons that run on the NetWorker server.
Advantages:
● The NetWorker server daemons generate the majority of the security audit messages. In this configuration, the audit log
messages are not sent over the network and will not increase network traffic.
● Security audit messages from each NetWorker client are sent to the NetWorker server. Additional network ports and routes
to other networks are not required to send security audit messages.
The following figure provides an example of this configuration.
Multiple data zones: The NMC server hosts the nsrlogd daemon
In this configuration, the nsrlogd daemon runs on the NMC server and the NMC server manages multiple NetWorker data zones.
The NMC server must be configured as a client, on each NetWorker server.
Advantages:
● Centralized logging of the security audit messages. The security audit log for each NetWorker server is stored on the NMC
server.
Disadvantages:
● If the nsrlogd daemon is not accessible, either because the daemon fails or because of a message routing difficulty,
security-related events are not recorded.
● The NetWorker server daemons generate the majority of the security audit messages. In this scenario, the security audit log
messages are sent over the network and increase network traffic.
● Each NetWorker host in each datazone must have a route to the NMC server.
The following figure provides an example of this configuration.
Security events
The security audit log feature detects and reports configuration changes that can result in inappropriate access or damage to
a NetWorker server. NetWorker logs successful and unsuccessful attempts to create and delete security-related resources and
modifications of security-related resource attributes in the audit log file.
Resource database
The following table summarizes which resources and attributes the security audit log monitors in the resource database (RAP).
Table 27. Security event resources and attributes - resource database (RAP)
NSR Resource/NMC resource name Attribute
NSR/NSR Administrator
Authentication method
Auditlog filepath
Auditlog hostname
Archive users
Backup command
Executable path
Password
Remote access
Remote user
Index path
Password
Encryption
Password
Password
Password
Proxy
Username
Name
Users
Notifications Action
NSR Operation Status command
NSR Report Home Command
Mail Program
Privileges
Users
Remote user
Name
Privileges
Users
Resource identifier
Table 28. Security event resources and attributes - NetWorker client database
Resource Attribute
NSR log Administrator
Log path
Maximum size MB
Maximum versions
Name
Owner
Certificate
Name
NW instance ID
Peer hostname
Features
Name
Product version
Connection ports
Service ports
NSRLA Administrator
Auth methods
Certificate
Disable directed recover
My hostname
Name
NW instance ID
NW instance info file
private key
VSS writers
03/03/12 14:28:39 0 nsrd Failed to modify Resource type: 'NSR usergroup', Resource name:
'Users' for Attribute: users' by user: 'administrator' on host: 'nwserver.emc.com'
where:
● The TimeStamp is 03/03/12 14:28:39.
● The Category is 0.
● The ProgramName is nsrd.
● The RenderedMessage is Failed to modify Resource type: 'NSR usergroup', Resource name: 'Users' for
Attribute: 'users' by user: 'administrator' on host: 'nwserver.emc.com'.
nsrd Permission denied, user 'username' on host: 'hostname' does not have 'privilege1' or
'privilege2' privilege to delete this resource - resource_type
This message appears when a user attempts to delete a security-related resource but does not have the required privileges on
the NetWorker server.
For example:
15/08/2014 8:56:31 AM 3 nsrd Permission denied, user 'debbie' on 'bu-
iddnwserver.iddlab.local' does not have 'Delete Application Settings' or 'Configure
NetWorker' privilege to delete this resource -
NSR client.
nsrd Failed to create Resource type: 'resource_type', Resource name: 'resource_name' by user:
'username' on host: 'hostname'
This message appears when a user cannot create a security-related resource. For example, if a user attempts to create a new
client resource but the client hostname is not valid, a message similar to the following appears:
15/08/2014 8:49:57 AM 3 nsrd Failed to create Resource type: 'NSR client', Resource name:
'bu-exch1.lss.emc.com' by user: 'debbie' on host: 'bu-iddnwserver.iddlab.local'
nsrd Permission denied, user 'username' on host: 'hostname' does not have privilege1' or
'privilege2 privilege to configure this resource - resource_type
This message appears when a user attempts to modify a security-related attribute in a resource but does not have the required
privileges.
For example:
15/08/2014 9:03:45 AM 3 nsrd Permission denied, user 'debbie' on 'bu-
iddnwserver.iddlab.local' does not have 'Configure NetWorker' OR 'Change Application
Settings' privilege to configure this resource - NSR client.
gstd Console: User 'username' failed to login to Console server on host 'hostname'
This message appears when you specify an incorrect username or password on the NMC server login window.
For example:
14/08/2014 4:36:43 PM 0 gstd Console: User 'root' failed to login to Console server on host
'bu-iddnwserver.iddlab.local'
gstd Console: User 'username' successfully logged in to Console server on host 'hostname'
This message appears when you successfully log in to the NMC server.
For example:
14/08/2014 4:36:49 PM 0 gstd Console: User 'administrator' successfully logged in to
Console server on host 'bu-iddnwserver.iddlab.local'
7. (Optional) In the auditlog maximum file version attribute, change the maximum number of the audit log file versions that
NetWorker maintains.
When the log file version reaches the maximum number, NetWorker removes the oldest archived version of the security
audit log file before creating the log file.
The default value for the auditlog maximum file version attribute is 0, which means that NetWorker maintains all versions.
8. (Optional) In the security audit log in the auditlog severity attribute, change the audit message severity to increase or
decrease the volume of messages that are saved.
The following severity levels are available.
Changes to the attribute apply to each client that generates security-related events. For example, if the security audit log
severity attribute is Information, all clients send messages with the Information severity level. The Information and Notice
level audit messages are common. If the security audit log records too much or too little detail, then adjust the severity level
accordingly.
NOTE: This field also controls remote client security audit configuration. At the information, notice and warning
levels, nsrd broadcasts the security configuration to all clients during startup. At other levels, when supported clients
9. (Optional) use a third-party logging service to send security audit log messages to by using the auditlog rendered service
attribute.
The following table describes the available options. Each option enables NetWorker to write unrendered security audit log
messages to the NetWorker_server_sec_audit.raw file only. To render the log file in to a readable format, use the
nsr_render_log program.
syslog Also writes rendered security audit log messages to the UNIX syslog.
eventlog Also writes rendered security audit log messages to the Windows Event Log.
10. (Optional) In the auditlog rendered locale attribute, specify the locale for the rendered audit log file. If this attribute is
empty, the default locale en_US is used. The Multi-locale datazone considerations section in the NetWorker Installation
Guide describes how to install and configure the NetWorker software on a machine that uses a non-English locale.
The following figure provides an example of the Security Audit Log Properties resource.
● If the host specified in the auditlog hostname attribute does not support security audit logging or the nsrlogd
daemon does not start successfully, a message similar to the following appears:
● If a service port is not available on the host that is specified in the auditlog hostname attribute, the nsrlogd daemon
fails to start and a message similar to the following appears:
Process nsrlogd was spawned on 'security_audit_log_hostname', but nsrlogd could
not open an RPC channel. 'Unable to connect to the nsrlogd process on host
'security_audit_log_hostname'. '352:Remote system error'
● If the path specified in the auditlog filepath attribute does not exist, a message similar to the following appears:
Unable to open the output file '/proc/NetWorker_server_sec_audit.raw' for the security
audit log. No such file or directory
NOTE: Users that belong to the Security Administrators User Group, but not the Application Administrators User Group
cannot see messages in the Logs window.
<error-page>
<error-code>404</error-code>
<location>/error.jsp</location>
</error-page>
<error-page>
<error-code>500</error-code>
<location>/error.jsp</location>
</error-page>
<error-page>
<error-code>400</error-code>
<location>/error.jsp</location>
</error-page>
3. Add a new file with the name error.jsp in the webapps directory of the distribution.
The location of the file:
● Windows: C:\Program Files\EMC NetWorker\nsr\authc-server\tomcat\webapps
● Linux: /nsr/authc/webapps
4. Using an editor, edit the error.jsp file and add the following content
<html>
<head>
<title>NSR Authentication Services Error</title>
</head>
<body> Page Not Found! </body>
</html>
ciphers="TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA256,
TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA,
TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_AES_256_GCM_SHA384"/>
Strong Password
<Server port="8005" shutdown="5hu!dOwN!\">
ciphers="TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA,
TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256,
TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA256,
TLS_RSA_WITH_AES_256_GCM_SHA384"
/>
<Connector port="9090"
protocol="org.apache.coyote.http11.Http11NioProtocol"
SSLEnabled="true"
maxThreads="150" scheme="https" secure="true"
keystoreFile="/nsr/authc/conf/authc.keystore " keystorePass="$
{keystore.password}"
keyAlias="emcauthctomcat" keyPass="${tckey.password}"
clientAuth="false" sslProtocol="TLS"
sslEnabledProtocols="TLSv1.2, TLSv1.1, TLSv1"
ciphers="TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
TLS_RSA_WITH_AES_128_CBC_SHA,
TLS_RSA_WITH_AES_128_CBC_SHA256,
TLS_RSA_WITH_AES_128_GCM_SHA256,
TLS_RSA_WITH_AES_256_CBC_SHA,
TLS_RSA_WITH_AES_256_CBC_SHA256,
TLS_RSA_WITH_AES_256_GCM_SHA384" />
sslEnabledProtocols="TLSv1.2,"
To enable TLS 1.0 and TLS 1.1, update to indicate the following:
NOTE: It is recommended to not use TLS 1.1 or TLS 1.0 because it is not secure and has vulnerabilities.