Configuration of NetBackup KMS
NetBackup security and encryption provide protection for all parts of NetBackup
operations. The parts that are made secure include the NetBackup master server,
media server, and attached clients. Also made secure are the operating systems
on which the servers and clients are running. The backup data is protected through
encryption processes and vaulting. NetBackup data that is sent over the wire is
protected by dedicated and secure method.
operations. The parts that are made secure include the NetBackup master server,
media server, and attached clients. Also made secure are the operating systems
on which the servers and clients are running. The backup data is protected through
encryption processes and vaulting. NetBackup data that is sent over the wire is
protected by dedicated and secure method.
Here we are going to configure the tape based encryption, Please note that there is Media sever level encryption as well.
1) Tape Library Configuration
a. Application Managed Encryption (AME) does not require a key.
Library Managed Encryption (LME) and System Managed Encryption (SME) require a license key which is available by purchasing Feature Code 5900. Minimum
· Prerequisites for Application Managed Encryption (AME) - LTO 6
· SAS and Fibre Channel LTO Ultrium 6 Tape Drive (Full High or Half High)
· Ultrium 6 Tape Cartridge
· Library firmware level B.50 or higher
· Drive firmware level C800 or higher, for reference go to http://www.ibm.com/fixcentral.
· Encryption Key Manager application
b. Tape Library:
i. Click Configure Library > Encryption in the left navigation panel.
ii. On the Encryption screen, select an Encryption method for each logical library. Without an encryption license key, select None or Application Managed Encryption.
iii. Click Submit to apply the changes.
2) Overriding the Symantec Intrusion Security policy (IPS)
a. Use SSH to login to the appliance as an Administrator
b. Go to Support > Maintenance menu. If you try to access the elevate command the following message is displayed:
Permission Denied !! Access to the root account requires overriding the Symantec Intrusion Security Policy. Please refer to the appliance security guide for overriding
c. Run the Support > Maintenance command.
d. To enter your Maintenance account, run the following command, and provide the password when you receive a prompt.
<!--Maintenance Mode--!>
maintenance’s password:
e. In the Maintenance mode, type the following command to override the Symantec
Intrusion Security Policy:
/opt/Symantec/scspagent/IPS/sisipsoverride.sh
Password:
f. Enter your maintenance password.
Choose the type of override that you wish to perform:
1. Override Prevention except for Self Protection
2. Override Prevention Completely
Choice?
Choose the amount of time after which to automatically re-enable:
1. 15 minutes
2. 30 minutes
3. 1 hour
4. 2 hours
5. 4 hours
6. 8 hours
7. never
The appliance displays the following message:
Enter a comment. Press Enter to continue.
i. Enter a relevant comment as to why the override is required.
Please wait while the policy is being overridden.
........
The policy was successfully overridden.
a. Run the following command to change directory:
c. Enter a passphrase for the host master key (HMK). You can also press Enter to create a randomly generated key.
d. Enter an ID for the HMK. This ID can be anything descriptive that you want to use to identify the HMK.
e. Enter a passphrase for the key protection key (KPK).
f. Enter an ID for the KPK. The ID can be anything descriptive that you want to use to identify the KPK.
g.The KMS service starts when after you enter the ID and press Enter.
h. Start the service by running the following command:
i. Use the grep command to ensure that the service has started, as follows:
k. Create a key record by using the -createkey option.
nbkmsutil -createkey -kgname ENCR_volumepool -keyname keyname -activate -desc "message"
l. Provide the passphrase again when the script prompts you.
Note: Symantec recommends that you keep a record of the output of the nbkmsutil -listkeys command. The key tag that is listed in the output is necessary if you need to recover keys.
No comments:
Post a Comment