Dell PowerStore 1000T EMC PowerStore Security Configuration Guide - Page 3

Dell EMC PowerStore Security Configuration Guide, Authenticating and Managing User Accounts, Roles

Page 3 highlights

Contents Additional Resources...5 Chapter 1: Authentication and access 6 Authenticating and Managing User Accounts, Roles, and Privileges 6 Factory default management...6 Session rules...7 Username and password usage...7 ESXi passwords...7 Roles and privileges...8 User account management based on role privileges 10 Reset admin and service account passwords...11 Certificates...13 Viewing certificates...13 Secure communication between PowerStore appliances within a cluster 13 Secure communication for replication and data import 13 vSphere Storage API for Storage Awareness support...14 CHAP authentication...15 Configuring CHAP...15 External SSH access...16 Configuring external SSH access...16 SSH sessions...16 Service account password...16 SSH authorization...17 Appliance service scripts...17 Appliance node Ethernet service port and IPMItool 17 NFS secure...17 Security on file system objects...18 File systems access in a multiprotocol environment...19 User mapping...19 Access policies for NFS, SMB, and FTP...22 Credentials for file level security...23 Understanding Common AntiVirus Agent (CAVA)...24 Code signing...25 Chapter 2: Communication security settings 26 Port Usage...26 Appliance network ports...26 Appliance network ports related to file...27 Network ports related to PowerStore X model appliances 30 Chapter 3: Auditing...32 Auditing...32 Chapter 4: Data security settings 33 Contents 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41

Additional Resources
......................................................................................................................
5
Chapter 1: Authentication and access
...............................................................................................
6
Authenticating and Managing User Accounts, Roles, and Privileges
..............................................................................
6
Factory default management
.........................................................................................................................................
6
Session rules
.....................................................................................................................................................................
7
Username and password usage
.....................................................................................................................................
7
ESXi passwords
................................................................................................................................................................
7
Roles and privileges
.........................................................................................................................................................
8
User account management based on role privileges
.................................................................................................
10
Reset admin and service account passwords
.............................................................................................................
11
Certificates
............................................................................................................................................................................
13
Viewing certificates
........................................................................................................................................................
13
Secure communication between PowerStore appliances within a cluster
...................................................................
13
Secure communication for replication and data import
..................................................................................................
13
vSphere Storage API for Storage Awareness support
....................................................................................................
14
CHAP authentication
...........................................................................................................................................................
15
Configuring CHAP
................................................................................................................................................................
15
External SSH access
............................................................................................................................................................
16
Configuring external SSH access
.......................................................................................................................................
16
SSH sessions
...................................................................................................................................................................
16
Service account password
............................................................................................................................................
16
SSH authorization
...........................................................................................................................................................
17
Appliance service scripts
...............................................................................................................................................
17
Appliance node Ethernet service port and IPMItool
..................................................................................................
17
NFS secure
............................................................................................................................................................................
17
Security on file system objects
...........................................................................................................................................
18
File systems access in a multiprotocol environment
........................................................................................................
19
User mapping
..................................................................................................................................................................
19
Access policies for NFS, SMB, and FTP
.....................................................................................................................
22
Credentials for file level security
..................................................................................................................................
23
Understanding Common AntiVirus Agent (CAVA)
..........................................................................................................
24
Code signing
.........................................................................................................................................................................
25
Chapter 2: Communication security settings
...................................................................................
26
Port Usage
...........................................................................................................................................................................
26
Appliance network ports
...............................................................................................................................................
26
Appliance network ports related to file
.......................................................................................................................
27
Network ports related to PowerStore X model appliances
.....................................................................................
30
Chapter 3: Auditing
.......................................................................................................................
32
Auditing
.................................................................................................................................................................................
32
Chapter 4: Data security settings
...................................................................................................
33
Contents
Contents
3