vplex-securityconfigguide-62sp1
vplex-securityconfigguide-62sp1
2 Service
Pack 1
Security Configuration Guide
6.2.1
January 2024
Rev. A00
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2024 Dell Inc. or its subsidiaries. All rights reserved. Dell Technologies, Dell, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
Contents
Tables........................................................................................................................................... 5
Preface.........................................................................................................................................................................................6
Contents 3
Port Usage..................................................................................................................................................................... 41
Communications Specifications - VPLEX Metro System.................................................................................. 42
Communications Specifications - VPLEX Local System.................................................................................... 44
Network Encryption....................................................................................................................................................45
Creating a Local Certification Authority................................................................................................................ 45
Finding the host certificates SHA256 and MD5 fingerprints........................................................................... 46
Finding the SSH key fingerprint (for SSH users)................................................................................................ 47
Data security settings.................................................................................................................................................47
4 Contents
Tables
Tables 5
Preface
As part of an effort to improve its product lines, Dell EMC periodically releases revisions of its software and hardware.
Therefore, some functions that are described in this document might not be supported by all versions of the software or
hardware currently in use. The product release notes provide the most up-to-date information about product features.
Contact your Dell EMC technical support professional if a product does not function properly or does not function as described
in this document.
NOTE: This document was accurate at publication time. Go to Dell EMC Online Support to ensure that you are using the
latest version of this document.
Purpose
This document is part of the VPLEX documentation set, and includes conceptual information about managing your VPLEX
system.
Audience
This guide is intended for use by customers and service providers to configure and manage a storage environment.
Related Documentation
Contains document titles for the appliance document set. Related documents (available on Dell EMC Online Support and Solve)
include:
● VPLEX Release Notes for GeoSynchrony Releases
● VPLEX Product Guide
● VPLEX Hardware Environment Setup Guide
● VPLEX Configuration Worksheet
● VPLEX Configuration Guide
● VPLEX Security Configuration Guide
● VPLEX CLI Reference Guide
● VPLEX Administration Guide
● Unisphere for VPLEX Help
● VPLEX Element Manager API Guide Version 2 (REST API v2)
● VPLEX Open-Source Licenses
● VPLEX GPL3 Open-Source Licenses
● Procedures provided through the SolVe Desktop
● Dell EMC Host Connectivity Guides
● Dell EMC VPLEX Hardware Installation Guide
● Various best practice technical notes available at Dell EMC Online Support.
Typographical conventions
Table 1. Typographical conventions used
Type style Description
Bold Used for names of interface elements, such as names of
windows, dialog boxes, buttons, fields, tab names, key names,
and menu paths (what the user specifically selects or clicks).
Italic Used for full titles of publications referenced in text
6 Preface
Table 1. Typographical conventions used (continued)
Type style Description
Monospace Used for:
● System code
● System output, such as an error message or script
● Pathnames, filenames, prompts, and syntax
● Commands and options
Monospace italic Used for variables
Monospace bold Used for user input
[] Square brackets enclose optional values.
| Vertical bar indicates alternate selections - the bar means
"or".
{} Braces enclose content that the user must specify, such as x
or y or z.
... Ellipses indicate nonessential information that is omitted from
the example.
Your comments
Your suggestions help to improve the accuracy, organization, and overall quality of the user publications. Send your opinions of
this document to: [email protected].
Preface 7
1
VPLEX Overview
A Dell EMC VPLEX cluster consists of one, two, or four engines (each containing two directors), and a management server. A
dual-engine or quad-engine cluster also includes a pair of Fibre Channel switches for communication between directors.
The standby power supply protects each VS2 engine in all configurations. The VS2 Dual and Quad-Engine configurations come
with Fibre Channel switches and UPS' from which the Fibre Channel switches get their power. All VS2s configurations have a
separate management server. For the Dual and Quad-engine configurations, their management servers get their power from a
UPS.
Each VS6 engine has Battery Backup Units (BBU) that replace the SPS that was given in the VS2s. The Dual and Quad-engine
VS6s have InfiniBand (IB) Switches and UPS'. The IB Switches get their power from the UPS'. The VS6 engine has two
Management Module Control Stations (MMCS), the top one in engine-1-1 is the management server (MMSC-A) and the second
one, MMCS-B. It does not act as a management server, or backup to the MMCS-A. It is only used to manage the alternate IP
address, .253, in the VS6 configuration. There is only one management server per VS6 configuration that is in engine-1-1, and it
is powered by the engine chassis.
The management server has a public Ethernet port, which gives cluster management services when connected to the customer
network. It can also give call-home services through the public Ethernet port by connecting to Dell EMC Secure Remote
Support (ESRS) gateway deployed on the same network. The Dell ESRS gateway is also used by Dell EMC personnel to give
remote service.
Two VPLEX implementations are available:
● VPLEX Local (single cluster)
● VPLEX Metro (two clusters separated by synchronous distances)
In a VPLEX Metro implementation, the clusters are connected over IP between the management servers.
VPLEX user authentication is configured locally on the management server or remotely on an OpenLDAP or Active Directory
server which integrates with UNIX using Service for UNIX 3.5, Identity Management for UNIX, or other authentication service.
A management server in each VPLEX cluster authenticates users against account information that is kept on its local file system
or against the LDAP/AD server. An authenticated user can manage resources in the local cluster.
In a VPLEX Metro, users authenticated by either management server, can manage all resources in both clusters. The below
figure shows a VPLEX cluster configuration (quad system) example.
8 VPLEX Overview
Engine 4, Director B ON
I
O
OFF
ON
I
O
OFF
Engine 4, Director A
SPS 4B SPS 4A
ON ON
I I
O O
OFF OFF
SPS 3B SPS 3A
Laptop tray
Fibre Channel switch B
UPS B
Fibre Channel switch A
UPS A
OFF OFF
O O
I I
Management server
ON ON
SPS 2B SPS 2A
OFF OFF
O O
I I
ON ON
SPS 1B SPS 1A
VPLX-000228
VPLEX Overview 9
Figure 2. VPLEX Cluster Configuration (VS6) - front view
10 VPLEX Overview
Figure 3. VPLEX Cluster Configuration (VS6) - rear view
VPLEX Overview 11
2
Security Recommendations
While the Security Configuration Guide must be reviewed in its entirety, the below section serves to highlight the most
important security recommendations of Dell EMC to ensure the security of your data and environment.
● Given the elevated permissions granted to the service account the password of the account must be changed in order to
better protect VPLEX from misuse or abuse of those privileges. Changing the Service Account Password provides more
information.
● To protect your data in the communications between clusters in VPLEX Metro configuration an external encryption solution
such as IPSec must be used to guarantee confidentiality and authentication for the IP WAN COM link. Communication
Security Settings gives more information.
● To protect the identity and integrity of your users and their account credentials all LDAP communication must be configured
to use the LDAPS protocol. Implementing LDAP gives more information.
● When the service account password is changed the customer must make either their field engineer, their SAM, or Support,
aware of it is being changed, and what the new password is. So, it can be added to the connectivity Hub. When support gets
a case, and access is required, they can take the permission from the customer to access the current service account, if the
password is available. It prevents delay in working a case to resolve.
● When the service account password is changed, it is advice that the customer tells their field engineer, their SAM, or
Support, aware of it is being changed and what the new password is.
12 Security Recommendations
3
VPLEX Management Server Operating
System and Networking
The operating system (OS) of the VPLEX management server is based on Novell SUSE Linux Enterprise Server. The
management server in GeoSynchrony releases 5.3 to 5.5.2 and patches run SUSE Linux Enterprise Server 11 patch 3. Starting
with release 6.0 to 6.2 Patch 7, the management server, including MMCS-A and MMCS-B on VS6, runs SUSE Linux Enterprise
Server 11 Service Pack 4. In 6.2 Service Pack 1 the management servers, including MMCS-A and MMCS-B on the VS6, runs
SUSE Linux Enterprise Server 15 Service Pack 3.
NOTE: Before 6.2.x all the releases are End of Service Support (EOSS), and it is recommended to upgrade VPLEX to
the latest GeoSynchrony code release to get the benefit of all fixes, security fixes, and improvements not available in the
current running code level.
The operating system has been configured to meet Dell EMC security standards by disabling or removing unused services and
packages, and protecting access to network services through a firewall.
Used packages are hardened with security updates.
A VS2 management server has four Ethernet ports, identified as eth0 through eth3 by the operating system, which is shown in
the figure below. A 1 Gb/s public management port (eth3) is the only Ethernet port in the VPLEX rack that may be connected
to an external management LAN. Other components in the rack are connected to two redundant private management Ethernet
networks, which are connected to the management server eth0 and eth2 ports. A service port (eth1) can be connected to a
local laptop, giving access to the same services as a host on the management LAN.
In a VS6 system, the management server module (MMCS-A and MMCS-B) is on the first engine in the cluster. All the remaining
engines have Akula management modules for the management connectivity. MMCS A is the Management interface to a public
network and to the other VPLEX components in the cluster.
Topics:
• Accessing the management server
https://management_server_public_IP_address
To access the GUI using an IPv6 address, use the following URL:
https://[mgmtserver_ipv6_addr]
For example:
https://[3ffe:80c0:22c:803c:215:17ff:fed3:207]/smsflex/VPlexConsole.html
NOTE: Accessing the VPLEX GUI or the VPLEX CLI over IPv6 is possible only if the client machine is also in an IPv6
network. The readonly user can access the GUI in read-only mode with limitations.
The GUI encrypts all traffic using a server certificate. Creating a host certificate provides more information.
NOTE: The GUI has a timer that logs the user out after 10 minutes of inactivity. You can modify the timeout value to a
maximum of 12 hours.
Although you might have already secured the network connections between two VPLEX Metro clusters, the management
servers must establish an explicit VPN connection, to acknowledge that the remote management server has full management
control over the local cluster and its resources.
The VPLEX management server uses strongSwan, an open source implementation of IPsec for Linux.
Prerequisites
To use SCP to transfer files to and from the management server, you must have shell access.
Files that are transferred with SCP into or out of the management server can be viewed in the contexts /management-
server/users/share/in and /management-server/users/share/out respectively. All users see identical output
(independent of file ownership) under these in and out contexts. Only the owner of the file (admin or service users) can
delete a file.
For example, if user testuser1 (with no shell access) uses SCP to transfer a file named a.txt into the management server,
anyone that is logged into the management server sees a.txt displayed in the /management-server/users/share/in
context. No one other than testuser1 (or admin or service) can delete a.txt from the management server.
service and admin users are authorized to delete any existing file in the SCP subdirectories, using the CLI rm command. Other
users are only authorized to delete files to which they have access. See the rm command in the EMC VPLEX CLI Reference
Guide for details.
To modify permissions for SCP file transfers to and from the management server, do the following.
VPlexcli:/management-server/users/local/testuser1> ls
Name Value
------------ ---------
role-name vplexuser
shell-access false
user-name testuser1
2. Run the following examples to test SCP file transfers for restricted shell user testuser1.
a. Transfer files from a remote server and verify that the file transfer was successful by listing the management server SCP
in context.
VPlexcli:/> ll /management-server/share/in/
Name
---------------
logfile
loginbanner.txt
monitor.xml
b. Transfer files from the management server to an external host and verify the result in the management server. The file
should be present in shell location /diag/share/out/. This path equates to /managementserver/share/out/ in
the CLI.
VPlexcli:/> ll /management-server/share/out/
Name
--------
testfile
c. Transfer files to a management server directory that is inaccessible to the shell restricted user testuser1 using scp.
Use SCP to transfer a file from the management server to an external host. The file is present in location /tmp/
d. Delete a.txt from the SCP share/in context using the rm command.
VPlexcli:/management-server/share/in> ls
a.txt b.txt
VPlexcli:/management-server/share/in> rm a.txt
VPlexcli:/management-server/share/in> ls
b.txt
Steps
1. Launch PuTTY.exe, and configure the PuTTY window as shown in the figure below:
● Server address — Public IP address of the VPLEX management server.
● Session name — Type a name for the PuTTY session you are configuring. This allows you to load the saved session if you
need to reconnect later, eliminating the need to configure the individual parameters again.
● Default settings — Verify, and set as shown if necessary.
MMCS IP Addresses
This table lists the IP addresses of the MMCS modules on engine-1 of VPLEX VS6 systems.
IP Addresses
Table 7. Cables and Director IP Addresses
Cable Director IP Address
Cable From To If cable is in Cluster 1 If cable is in Cluster 2
ID in
Figure
A1 MMCS-A Management A Eng-2 MM-A LAN Service Director-1-1-A, subnet B Director-2-1-A, subnet B
Fabric connector port
128.221.253.35 128.221.253.67
A2 Eng-2 MM-A LAN Eng-3 MM-A LAN Service Director-1-2-A, subnet B Director-2-2-A, subnet B
Management port port
128.221.253.37 128.221.253.69
A3 Eng-3 MM-A LAN Eng-4 MM-A LAN Service Director-1-3-A, subnet B Director-2-3-A, subnet B
Management port port
128.221.253.39 128.221.253.71
B2 Eng-2 MM-B LAN Eng-3 MM-B LAN Service Director-1-2-B, subnet A Director-2-2-B, subnet A
Management port port
128.221.252.38 128.221.252.70
B3 Eng-3 MM-B LAN Eng-4 MM-B LAN Service Director-1-3-B, subnet A Director-2-3-B, subnet A
Management port port
128.221.252.40 128.221.252.72
24 Implementing IPv6
6
Security configuration settings
This section provides an overview of user accounts and privileges.
Topics:
• User Roles, Accounts, and Privileges
Fibre Channel COM root fibranne ● Access to the Fibre Channel internal switch
switch (FRU switches interface
ONLY) (5) ● Ability to add and delete other accounts on
the switch interface
● Ability to change passwords on the switch
interface, including the root and factory
passwords
admin password ● Access to the Fibre Channel internal switch
interface
● Ability to add and delete other accounts on
the switch interface
● Ability to change passwords on the switch
interface
NOTE: The root privileges for performing maintenance activities on Cluster Witness are restricted to the Service account.
NOTE: TLS v1.2 and above are supported in 6.2 SP1, but versions below 1.2 are no longer supported.
● An external OpenLDAP or Active Directory server which integrates with UNIX using Service for UNIX 3.5, Identity
Management for UNIX, or other authentication service.
OpenLDAP and Active Directory users are authenticated by the server. Usernames and passwords that are created on an
external server are fetched from the remote system to the VPLEX system each time they are used.
● The VPLEX management server
Usernames and passwords are created locally on the VPLEX system, and are stored on VPLEX.
Customers who do not want to use an external LDAP server for maintaining user accounts create their user accounts on the
VPLEX system itself.
VPLEX is preconfigured with two default user accounts: admin and service.
See the Dell EMC VPLEX CLI Command Reference Guide for information about the commands used to configure user
authentication.
Topics:
• Role-Based Access Control Feature: Overview
• Implementing LDAP
• Password Policy
• Synchronizing service account password to MMCS peer
To improve security beginning with GeoSynchrony release 6.0 the shell access is limited to the admin and service users only.
Any user or script that is previously defined with shell access (such as service, for example) continues to have shell access
in release 6.0. Users or scripts not having shell access before 6.0 must have their accounts that are explicitly defined by
Role-based access control.
See the Dell EMC VPLEX CLI Reference Guide for more information about the User add command with the -r option.
The management server takes user-defined as admin or service to the shell command line upon login. Users without access are
redirected to the VPLEXCLI.
All users using LDAP credentials are defined as vplexuser by default.
Individual login credentials can be set for LDAP users as every user account has a different username and password. However,
all LDAP users are given identical privileges (same role and same shell access value). The Administrator can either grant or
revoke shell access to any customizable role, such as vplexuser.
NOTE: If you do not have shell access, you can only access a single directory when uploading and downloading files.
Role Descriptions
This topic describes roles that are supported under role-based access.
Shell access is turned off by default for all new VPLEX accounts. Roles are defined as follows:
● securityadmin - The VPLEX administrator at the customer site uses this role. There is only one securityadmin account
allowed in the management server. securityadmin has the same permissions as the vplexuser role yet also manages user
authorization and authentication (creating and deleting accounts).
● service - Only authorized Dell EMC service personnel use this role to configure VPLEX.
● vplexuser - This role is the basic minimum-access VPLEX user account. Best practices encourage that most users be
assigned this role with a unique customized account name. Limit assigning securityadmin roles to ensure security in your
installation. vplexuser role accounts correspond to accounts created by the admin and authorized VPLEX LDAP accounts.
● readonly - The readonly role limits users to perform read-only commands with the CLI, ensuring the user does not invoke
commands that damage or inhibit VPLEX functionality. It also gives a method of ensuring that automated monitoring tools
and scripts (CLI or REST) do not accidentally invoke damaging or unintended commands. The Admin can create one or
more accounts that have the readonly role. vplexuser role accounts (and authorized VPLEX LDAP accounts) created by the
Administrator may be defined as readonly when considered necessary.
Current admin and service users continue to have shell access. It is possible for the Administrator to turn shell access to
service on or off per account basis as described in this document.
Implementing LDAP
Starting in Release 5.2 and later, LDAP configuration is securely persisted using an internal security component. This removes
bind user credential vulnerabilities. The new implementation of LDAP includes the following:
● Use a new internal security component that ensures information is securely persisted.
● Support for Directory Server groups, a logical collection of users. Groups can be specified using the configuration commands
and can be added or removed using the map and unmap commands.
NOTE:
● LDAP should be reset before upgrading to the 6.2.1, and re-configure after upgrade.
● Nested groups and dynamic groups are not supported.
● Mapping of Organizational Unit (OUs) is not supported. Use of groups to map multiple users is recommended.
For upgraded systems or systems that have not previously had LDAP configured, existing configuration information or the way it
is persisted is not automatically modified. Authentications continue as they were earlier to upgrade. However, users can continue
to be mapped or unmapped with the old configuration.
To use the new implementation in a system where an LDAP configuration exists the LDAP configuration must be reconfigured
(unconfigured and configured) to leverage the new security features.
NOTE: Dell EMC recommends using LDAPS protocol for safe communication between Management Server and Directory
Server.
LDAP configuration in the Management Server requires Directory Server attributes which are not explicitly captured
during the EZSetup interview process. Default values are used instead of causing configuration issues only for Microsoft
Password Policy
Details of password policies and default values.
The VPLEX management server uses a Pluggable Authentication Module (PAM) infrastructure to enforce minimum password
quality. It uses pam_cracklib, a library that checks for dictionary words, to check potential passwords.
Starting in Release 5.2 and later, the management server uses the default value for the password policies that are listed in the
above table. You can configure each password policy to meet your specific needs. The new value is updated in the appropriate
configuration file, and existing users are updated with the new configuration. See VPLEX CLI Command Reference Guide for
information about the commands that are used to set password policies and the values allowed.
Note the following:
● Password policies do not apply to users configured using the LDAP server. LDAP server supports the valid password
characters.
● The Password inactive days policy does not apply to the admin account to protect the admin user from account lockouts.
● During the management server software upgrade, password of an existing user is not changed. Only the password age
information of the user changes.
● You must be an admin user to configure a password policy.
NOTE: VS6 systems support only the GeoSynchrony version 6.0 and later.
NOTE: VS6 systems support only the GeoSynchrony version 6.0 and later.
Similar steps to change the default service password are performed after the upgrade from VPLEX 5.2/5.4/5.5 to VPLEX
5.5. These are not encountered if the default service password has already been changed earlier in VPLEX 5.5 upgrade.
----------
2. Update the cws password (works if default CWS password is set currently):
Re-enter password:
----------
Re-enter password:
----------
4. Force update the CWS password from a known pre-set password to new password:
Re-enter password:
Re-enter password:
----------
5. Force update the CWS password from a known pre-set password to a random string:
Re-enter password:
Steps
1. Launch PuTTY (or a similar SSH client), and establish a connection to the public IP address of the VPLEX management
server.
2. Log in with username admin.
3. From the Linux shell prompt, type this command to connect to the VPlexcli:
vplexcli
4. Log in with username admin.
5. From the VPlexcli prompt, type the following command:
NOTE: The new user must change the password the first time they log in.
Prerequisites
When modifying user accounts, determine if the user needs shell access or not.
You must have administrator privileges to modify user accounts.
For an overview of role-based access control functionality and impact, see the VPLEX Security Configuration Guide.
VPlexcli:/management-server/users> ll
● ldap context - The ldap context displays the role-name and the shell-access associated with an LDAP user. All
LDAP users are given identical privileges and every LDAP user is treated the same.
Attributes associated with an LDAP user account are:
○ role-name - Name of the role with which the user account is associated.
○ shell-access - Defines the shell access privileges for a user.
In this example, the role-name vplexuser has shell access as an LDAP user:
VPlexcli:/management-server/users/ldap> ll
Name Value
------------ ---------
role-name vplexuser
shell-access false
● local context - The local context displays the role-name and the shell-access associated for a user with local
access. By default, admin and service are local users. In addition, any user in the system that is created by admin are local
users.
Attributes associated with a local user account are:
○ user-name - Name of the user
○ role-name - Name of the role with which the user account is associated
○ shell-access - Defines the user's shell access privileges.
In this example, the admin user is defined with role securityadmin and shell-access disabled.
VPlexcli:/management-server/users/local/admin> ll
Name Value
role-name securityadmin
shell-access false
user-name admin
To modify attributes such as role-name or shell-access, run the set command on the appropriate user account context.
Steps
1. List the attributes of the user (testuser in this example) by go to the appropriate context and running the ll command.
VPlexcli:/management-server/users/local/testuser> ll
role-name : user
shell-access : false
user-name : testuser
VPlexcli:/management-server/users/local/testuser> ll
role-name : user
shell-access : false
user-name : testuser
NOTE:
● role-name and shell-access are the only two writable attributes. user-name is not modifiable.
● The service account cannot be restricted from having shell access.
● The role-name of admin and service accounts is not modifiable. For local user/LDAP accounts, role-name can
be modified to either vplexuser or readonly. If any other role-name is given, the command fails with the
following error message:
Changing passwords
Any user can change their own password as follows:
Steps
1. Launch PuTTY (or a similar SSH client), and establish a connection to the public IP address of the VPLEX management
server.
2. Log in with the applicable username.
3. From the Linux shell prompt, type this command to connect to the VPlexcli:
vplexcli
4. Log in with username admin.
5. From the VPlexcli prompt, type the following command:
Resetting passwords
A user with an admin account can reset passwords for other users as follows:
Steps
1. Launch PuTTY (or a similar SSH client), and establish a connection to the public IP address of the VPLEX management
server.
2. Log in with username admin.
3. From the Linux shell prompt, type this command to connect to the VPlexcli:
vplexcli
4. Log in with username admin.
NOTE: The user must change the password the next time they log in.
Steps
1. Launch PuTTY (or a similar SSH client), and establish a connection to the public IP address of the VPLEX management
server.
2. Log in with username admin.
3. From the Linux shell prompt, type this command to connect to the VPlexcli:
vplexcli
4. Log in with username admin.
5. From the VPlexcli prompt, type the following command:
ConnectEMC /var/log/ConnectEMC/logs/ConnectEMC.log
files
Firewall /var/log/firewall
IP WAN COM
A VPLEX Metro system does not support native encryption over an IP WAN-COM link. Dell EMC recommends that you deploy
an external encryption solution such as IPSec to achieve data confidentiality and end-point authentication over IP WAN COM
links between clusters.
For releases earlier than 6.0 Service Pack 1 Patch 5, VPLEX used ephemeral ports in the range of 32768 to 61000 for UDP
connections over IP WAN-COM. Starting in Release 6.0 Service Pack 1 Patch 5, VPLEX uses the TCP protocol for its IP
WAN-COM communications. Configure TCP ports on the firewall for IP WAN-COM communications to work after an upgrade to
6.0 Service Pack 1 Patch 5. If the firewall type is filter and not proxy, you must open the following firewall ports:
● UDP ports (for releases earlier than 6.0 Service Pack 1 Patch 5)
○ Port 10000 (bi-directional)
○ Port 11000 (bi-directional)
○ Ports 32768 to 61000 (UDP bi-directional)
● TCP ports (for release 6.0 Service Pack 1 Patch 5 and later)
○ Port 61484
○ Port 61483
○ Port 61482
○ Ports 32768 to 61000
NOTE:
● Open the TCP ports before upgrading to 6.0 Service Pack 1 Patch 5 to ensure WAN connectivity.
● Close the UDP ports after the upgrade and confirmation that VPLEX is running 6.0 Service Pack 1 Patch 5, and can
communicate using TCP ports. If you do not close the UDP ports, UDP packets that are destined to those ports
make it through the firewall, but the director drops the packets. To ensure security for the firewall and network, EMC
recommends that you close the UDP ports after the upgrade.
Accessibility
To establish secure communication, note the following:
● The following protocols must be allowed on the customer firewall (both in the outbound and inbound filters):
# Encapsulating Security Payload (ESP): IP protocol number 50
# Authentication Header (AH): IP protocol number 51
● The following ports must be allowed on the customer firewall:
# Internet Key Exchange (IKE): UDP port 500
# NAT Traversal in the IKE (IPsec NAT-T): UDP port 4500
If VPLEX is deployed with IP inter-cluster network, the inter-cluster network must not be able to route to the following
reserved VPLEX subnets: 128.221.252.0/24, 128.221.253.0/24, and 128.221.254.0/24.
Port Usage
The following table lists all the network ports, and the services used by VPLEX components. This information, along with the
firewall settings are required to use the product.
CAUTION: For VPLEX Performance Monitor, ensure that Port 443 is open on the firewall between VPLEX
Performance Monitor and VPLEX. See Knowledge Base article 474842 for more information about configuring
the firewall policy for VPLEX IP WAN-COM communications over filter-based firewall.
Notes
(1) ICMP/Ping is needed between the management server (cluster 1) and external NTP.
This table describes the possible communication between the VPLEX components in a VPLEX Metro system.
Legend:
● A - VPLEX Management Client
● B - Management Server 1
● C - Management Server 2
● D - VPLEX Cluster Witness
● E - ESRS Server
This table describes the possible communication between the VPLEX components in a VPLEX Local System.
Legend:
● A - VPLEX Management Client
● B - Management Server 1
● C - ESRS Server
Network Encryption
The VPLEX management server supports SSH through the sshd daemon provided by the FIPS compliant OpenSSH package.
It supports version 2 of the SSH protocol. When the management server starts for the first time, the sshd daemon
generateskey-pairs (private and public key) for communication with SSH clients. rsa, dsa and ecdsa key-pairs are
generated to support communication with SSH version 2 clients.
The HTTPS protocol and the IPsec VPN use a X.509 host certificate to identify the server and encrypt all traffic. X.509 host
certificates use a 2048 bit host key. During initial setup of a VPLEX cluster, a local Certification Authority (which signs the host
certificate request) is created automatically.
VPLEX supports a corporate Certification Authority signing the host certificate requests. Users can import the corporate
Certificate Authority signed CA, host certificate and key file. The IPSec encryption can use RSA or ECDSA cryptography
generated key-pair certificates. You can use only one type (RSA or ECDSA) in configuring VPN in all the three components of
VPLEX, for example, the two management servers and the cluster witness server. Note that for a VPLEX Metro configuration,
the host certificates for both web and VPN to be imported on both clusters should be signed and created using the same CA
certificate.
To import the corporate Certificate Authority signed certificates, refer to the VPLEX CLI Guide.
NOTE: Host certificates are created as a part of EZsetup during a first time installation.
The VPlexcli command security create-host-certificate generates a host certificate request and signs it with the Certification
Authority certificate created in the Creating a Local Certification Authority. By default, this command creates the following:
● A 2048 key in /etc/ipsec.d/private/hostKey.pem
● A host certificate in /etc/ipsec.d/certs/hostCert.pem that remains valid for 730 days (2 years)
You must provide the CA key passphrase for the host key and the host certificate subject which must be the cluster's serial
number (found on the label attached to the top of the VPLEX cabinet).
Steps
1. Type the following command:
Output example:
SHA256
Fingerprint=91:65:4C:02:80:C0:C8:54:24:4A:71:2B:BF:C1:D5:3C:08:A2:2B:36:BC:7B:3D:A2:B3
:8A:72:83:66:E1:36:25
Output example:
MD5 Fingerprint=6E:2C:A5:8E:86:11:45:26:02:09:62:97:6F:18:FD:62
Steps
1. At the Linux shell prompt, type the following command:
Output example:
Output example:
Output example:
$6$<salt>$<encrypted>