Additional Resources
......................................................................................................................
5
Chapter 1: Authentication and access
...............................................................................................
6
Authenticating and Managing User Accounts, Roles, and Privileges
..............................................................................
6
Factory default management
.........................................................................................................................................
6
Session rules
.....................................................................................................................................................................
7
Username and password usage
.....................................................................................................................................
7
ESXi passwords
................................................................................................................................................................
7
Roles and privileges
.........................................................................................................................................................
8
User account management based on role privileges
.................................................................................................
10
Reset admin and service account passwords
.............................................................................................................
11
Certificates
............................................................................................................................................................................
13
Viewing certificates
........................................................................................................................................................
13
Secure communication between PowerStore appliances within a cluster
...................................................................
13
Secure communication for replication and data import
..................................................................................................
13
vSphere Storage API for Storage Awareness support
....................................................................................................
14
CHAP authentication
...........................................................................................................................................................
15
Configuring CHAP
................................................................................................................................................................
15
External SSH access
............................................................................................................................................................
16
Configuring external SSH access
.......................................................................................................................................
16
SSH sessions
...................................................................................................................................................................
16
Service account password
............................................................................................................................................
16
SSH authorization
...........................................................................................................................................................
17
Appliance service scripts
...............................................................................................................................................
17
Appliance node Ethernet service port and IPMItool
..................................................................................................
17
NFS secure
............................................................................................................................................................................
17
Security on file system objects
...........................................................................................................................................
18
File systems access in a multiprotocol environment
........................................................................................................
19
User mapping
..................................................................................................................................................................
19
Access policies for NFS, SMB, and FTP
.....................................................................................................................
22
Credentials for file level security
..................................................................................................................................
23
Understanding Common AntiVirus Agent (CAVA)
..........................................................................................................
24
Code signing
.........................................................................................................................................................................
25
Chapter 2: Communication security settings
...................................................................................
26
Port Usage
...........................................................................................................................................................................
26
Appliance network ports
...............................................................................................................................................
26
Appliance network ports related to file
.......................................................................................................................
27
Network ports related to PowerStore X model appliances
.....................................................................................
30
Chapter 3: Auditing
.......................................................................................................................
32
Auditing
.................................................................................................................................................................................
32
Chapter 4: Data security settings
...................................................................................................
33
Contents
Contents
3