Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 57

About Security Access Protocols, SSH Key Pair Authentication, Contact Information

Page 57 highlights

Attribute Password Description NOTE: Dell recommends that administrator account names not be reused after they have been deleted. All accounts can always view their own audit log information, and new accounts with previously used account names will be able to view audit records for the old account. Password for the account can be 3 to 13 ASCII characters and is case-sensitive. Punctuation characters are allowed, but spaces are not. Only the first 8 characters are used; the rest are ignored (without a message). You are not required to provide passwords for Active Directory accounts and groups after Active Directory has been configured. The passwords for these accounts are managed by the Active Directory server. Description Account type Pool access Additional access Enable account Contact Information Optional description for the account. Descriptions can be up to 127 characters. Fewer characters are accepted for this field if you type the value as a Unicode character string, which takes up a variable number of bytes, depending on the specific character. Can be one of group administrator, volume administrator, pool administrator, or a read-only account. Pools to which the account has access and, if the account is a volume administrator, the storage quota the account can manage within the selected pools. Applies to pool administrators and volume administrators. Grants the pool administrator read access to the entire group. Volume administrators have read access only to the individual pools containing the storage quotas that they manage. In addition, you can grant read-only users access to collect array diagnostics and/or save configurations. Whether the account is active (enabled) or not. A user cannot log in to a disabled account. Name, email address, and phone numbers for the account owner. Contact name can be up to 63 bytes. Email, Phone, and Mobile information can be up to 31 ASCII characters. About Security Access Protocols The PS Series group supports security protocols SSL/TLS and SSH, with a range of encryption algorithms. The protocols and algorithms enabled by default include some older protocols (such as SSH v1 and SSL v2) and encryption algorithms that are no longer recommended as best practices. The PS Series group supports SCP (secure copy) for copying firmware updates and diagnostic files to and from the array. It is a secure alternative to FTP and Telnet. PS Series arrays also support IPSec protocols to provide IPSec authentication and protection between group member arrays as well as between iSCSI initiators and the group. IPSec protocols must be manually enabled using the CLI. IPSec can be enabled for a group only if all members of that group support IPSec. For more information, see About IPsec. Unless you need to enable access from older clients (web browsers or SSH clients) that do not support the current encryption protocols and authentication algorithms, Dell recommends that you disable the legacy protocols and algorithms for best security. You must use the CLI to disable the legacy protocols; see the grpparams crypto-legacy-protocols command in the Dell EqualLogic Group Manager CLI Reference Guide. You can also enable or disable SSH v1 protocol support; see the grpparams cliaccess-ssh command. SSH Key Pair Authentication SSH key pairs are two cryptographically secure keys that can be used to authenticate a client to an SSH server. Each key pair consists of a public key and a private key. The private key is retained by the client and can be encrypted on disk with a passphrase only. The associated public key can be used to encrypt messages that only the private key can decrypt. Limitations SSH key pair authentication supports the following: • RSA and SSH 2 keys • One public key per user About Group-Level Security 57

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

Attribute
Description
NOTE: Dell recommends that administrator account names not be reused after they have been
deleted. All accounts can always view their own audit log information, and new accounts with
previously used account names will be able to view audit records for the old account.
Password
Password for the account can be 3 to 13 ASCII characters and is case-sensitive. Punctuation characters
are allowed, but spaces are not. Only the
first
8 characters are used; the rest are ignored (without a
message).
You are not required to provide passwords for Active Directory accounts and groups after Active Directory
has been
configured.
The passwords for these accounts are managed by the Active Directory server.
Description
Optional description for the account. Descriptions can be up to 127 characters. Fewer characters are
accepted for this
field
if you type the value as a Unicode character string, which takes up a variable
number of bytes, depending on the
specific
character.
Account type
Can be one of group administrator, volume administrator, pool administrator, or a read-only account.
Pool access
Pools to which the account has access and, if the account is a volume administrator, the storage quota
the account can manage within the selected pools. Applies to pool administrators and volume
administrators.
Additional access
Grants the pool administrator read access to the entire group. Volume administrators have read access
only to the individual pools containing the storage quotas that they manage. In addition, you can grant
read-only users access to collect array diagnostics and/or save
configurations.
Enable account
Whether the account is active (enabled) or not. A user cannot log in to a disabled account.
Contact Information
Name, email address, and phone numbers for the account owner. Contact name can be up to 63 bytes.
Email, Phone, and Mobile information can be up to 31 ASCII characters.
About Security Access Protocols
The PS Series group supports security protocols SSL/TLS and SSH, with a range of encryption algorithms. The protocols and
algorithms enabled by default include some older protocols (such as SSH v1 and SSL v2) and encryption algorithms that are no
longer recommended as best practices. The PS Series group supports SCP (secure copy) for copying
firmware
updates and
diagnostic
files
to and from the array. It is a secure alternative to FTP and Telnet. PS Series arrays also support IPSec protocols to
provide IPSec authentication and protection between group member arrays as well as between iSCSI initiators and the group. IPSec
protocols must be manually enabled using the CLI. IPSec can be enabled for a group only if all members of that group support IPSec.
For more information, see
About IPsec
.
Unless you need to enable access from older clients (web browsers or SSH clients) that do not support the current encryption
protocols and authentication algorithms, Dell recommends that you disable the legacy protocols and algorithms for best security.
You must use the CLI to disable the legacy protocols; see the
grpparams crypto-legacy-protocols
command in the
Dell EqualLogic
Group Manager CLI Reference Guide
. You can also enable or disable SSH v1 protocol support; see the
grpparams cliaccess-ssh
command.
SSH Key Pair Authentication
SSH key pairs are two cryptographically secure keys that can be used to authenticate a client to an SSH server. Each key pair
consists of a public key and a private key. The private key is retained by the client and can be encrypted on disk with a passphrase
only. The associated public key can be used to encrypt messages that only the private key can decrypt.
Limitations
SSH key pair authentication supports the following:
RSA and SSH 2 keys
One public key per user
About Group-Level Security
57