Data Protection Advisor Software Compatibility Guide
Data Protection Advisor Software Compatibility Guide
Version 9.1.x
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners.
Published in the USA.
EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com
Figures 5
Tables 7
Preface 9
Chapter 1 Introduction 13
1 Revision history............................................................................................................ 9
2 Style conventions........................................................................................................ 11
3 Configuration options................................................................................................. 20
4 Default password policy requirements ....................................................................... 46
5 NetWorker Authentication Service CLI options ......................................................... 48
6 NMC user roles and associated privileges...................................................................52
7 Allowed Operations for each NetWorker privilege ...................................................... 61
8 Privileges associated with each NetWorker User Group............................................. 65
9 Operations that require entries in the servers file ...................................................... 92
10 NetWorker server log files.......................................................................................... 98
11 NMC server log files.................................................................................................. 101
12 Client log files........................................................................................................... 102
13 Message types ......................................................................................................... 106
14 Raw log file attributes that manage log file size........................................................ 109
15 Raw log file attributes that manage the log file trimming mechanism........................ 110
16 NetWorker Authentication Service log files...............................................................122
17 Setting TCP parameters for each operating system..................................................130
18 Standard NetWorker Client port requirements to NetWorker server......................... 131
19 Additional service port requirements for Snapshot clients.........................................132
20 Service port requirements for storage nodes ........................................................... 133
21 NetWorker server program port requirements.......................................................... 134
22 Port requirements to NMC server to each NetWorker client ....................................135
23 nsrports options........................................................................................................ 137
24 Port requirements for NetWorker communications with third-party applications .....138
25 Levels available for the nsrck process....................................................................... 164
26 Security event resources and attributes - resource database (RAP)......................... 171
27 Security event resources and attributes - NetWorker client database.......................173
28 Message types ..........................................................................................................177
29 Auditlog rendered service attributes..........................................................................178
As part of an effort to improve its product lines, EMC periodically releases revisions of
its software and hardware. Therefore, some functions that are described in this
document might not be supported by all versions of the software or hardware
currently in use. The product release notes provide the most up-to-date information
on product features.
Contact your EMC technical support professional if a product does not function
correctly or does not function as described in this document.
Note
This document was accurate at publication time. Go to EMC Online Support (https://
support.emc.com) to ensure that you are using the latest version of this document.
Purpose
This document provides an overview of security settings available in the NetWorker
product.
Audience
This document is part of the EMC NetWorker documentation set, and is intended for
use by system administrators who are responsible for setting up and maintaining
NetWorker and managing a secure network.
Revision history
The following table presents the revision history of this document.
Related documentation
The NetWorker documentation set includes the following publications, available on
EMC Online Support:
l EMC NetWorker Online Software Compatibility Matrix
Provides a list of client, server, and storage node operating systems supported by
the EMC information protection software versions. You can access the matrix at
http://compatibilityguide.emc.com:8080/CompGuideApp/.
l EMC NetWorker Administration Guide
Describes how to configure and maintain the NetWorker software.
l EMC NetWorker Network Data Management Protocol (NDMP) User Guide
Describes how to use the NetWorker software to provide data protection for
NDMP filers.
l EMC NetWorker Cluster Integration Guide
Contains information related to configuring NetWorker software on cluster servers
and clients.
l EMC NetWorker Installation Guide
Provides information on how to install, uninstall, and update the NetWorker
software for clients, storage nodes, and servers on all supported operating
systems.
l EMC NetWorker Updating from a Previous Release Guide
Describes how to update the NetWorker software from a previously installed
release.
l EMC NetWorker Release Notes
Contains information on new features and changes, fixed problems, known
limitations, environment and system requirements for the latest NetWorker
software release.
l EMC NetWorker Command Reference Guide
Provides reference information for NetWorker commands and options.
l EMC NetWorker Data Domain Boost Integration Guide
Provides planning and configuration information on the use of Data Domain
devices for data deduplication backup and storage in a NetWorker environment.
l EMC NetWorker Performance Optimization Planning Guide
Contains basic performance tuning information for NetWorker.
l EMC NetWorker Server Disaster Recovery and Availability Best Practices Guide
Describes how to design, plan for, and perform a step-by-step NetWorker disaster
recovery.
l EMC NetWorker Snapshot Management Integration Guide
Describes the ability to catalog and manage snapshot copies of production data
that are created by using mirror technologies on EMC storage arrays.
l EMC NetWorker Snapshot Management for NAS Devices Integration Guide
Describes how to catalog and manage snapshot copies of production data that are
created by using replication technologies on NAS devices.
l EMC NetWorker Security Configuration Guide
Provides an overview of security configuration settings available in NetWorker,
secure deployment, and physical security controls needed to ensure the secure
operation of the product.
l EMC NetWorker VMware Integration Guide
Provides planning and configuration information on the use of VMware in a
NetWorker environment.
NOTICE
Note
Typographical conventions
EMC uses the following type style conventions in this document:
Italic Used for full titles of publications that are referenced in text
Monospace Used for:
l System code
l System output, such as an error message or script
l Pathnames, file names, prompts, and syntax
l Commands and options
® ®
EMC NetWorker is a heterogeneous backup application that addresses data
protection challenges. The centralized management capabilities of NetWorker
provides effective data protection for file systems, enterprise applications, storage
arrays, and NAS filers to a variety of target devices.
This guide provides an overview of security configuration settings available in
NetWorker, secure deployment, and physical security controls needed to ensure the
secure operation of the product.
This guide is divided into the following sections:
Access Control Settings
Access control settings enable the protection of resources against unauthorized
access. This chapter provides an overview of the settings available in the product
to ensure a secure operation of the product and describes how you can limit
product access by end-users or by external product components.
Log Settings
A log is a chronological record that helps you to examine the sequence of
activities surrounding or leading up to an operation, procedure, or event in a
security-related transaction from beginning to end. This chapter describes how to
access and manage the logs files available in NetWorker.
Introduction 13
Introduction
Managing authentication
The NetWorker Authentication Service is a web-based application that provides
authentication services to other applications.
The NetWorker Authentication Service maintains a local user database to verify the
credentials of a user account. You can also configure the NetWorker Authentication
Service to use an external authority database, for example LDAP or AD. When you
configure an external authority database, the NetWorker Authentication Service
communicates directly with an LDAP or AD server to authenticate users.
Use command line tools to configure and manage authentication.
where:
l name is the name of the tenant, without spaces. The maximum number of
characters is 256. Specify ASCII characters in the tenant name only.
l alias is alias of the tenant name. The maximum number of characters is
256.
l tenant_description is a user-defined description of the tenant. The
maximum number of characters is 256.
Note
Note
Ensure that you have a space before each -D. If you do not have a space before
the -D switch, authc_config appends the -D to the previous option value and
ignores the option value to which the -D is associated with.
The following table provides more information about each configuration option.
Default value: NO
Note
Default value: No
Note
The following figure provides an example of the key group attributes that you use
when you configure the AD authority.
Figure 3 Group properties in ADSI Edit
NetWorker provides a template file that you can modify with the configuration values
that are specific to your environment, and then run to configure AD authentication.
The location and name of the file differs on Windows and Linux:
l AD template file:
n Windows—C:\Program Files\EMC NetWorker\nsr\authc-server
\scripts\authc-create-ad-config.bat.template
n Linux—/opt/nsr/authc-server/scripts/authc-create-ad-
config.sh.template
To use the template file, perform the following steps:
1. Use a text editor to open the file.
2. Replace the variables enclosed in <> with the values that are specific to your
configuration. The following output provides an example of the contents of the file
after substituting the attributes for your configuration:
Note
In this example, to restrict NMC and NetWorker servers access to only users in
the NetWorker_admins group, you must configure the NMC Roles on the NMC
server and the User Groups resource on the NetWorker server. The section "User
authentication and authorization" provides more information.
The following figure provides an example of the key group attributes that you use
when configuring the LDAP authority.
Figure 5 Group properties in LDAPAdmin
NetWorker provides a template file that you can modify with the configuration values
that are specific to your environment, and then run to configure AD authentication.
The location and name of the file differs on Windows and Linux:
nike1 uid=nike1,ou=AlbertaPeople,dc=alberta,dc=emc,dc=com
nike2 uid=nike2,ou=AlbertaPeople,dc=alberta,dc=emc,dc=com
sampar1
uid=sampar1,ou=AlbertaPeople,dc=alberta,dc=emc,dc=com
where:
l java_path is /usr/java/latest on UNIX and on Windows is latest version
subfolder version in C:\Program Files\Java directory.
l "password" is the Java trust keystore password.
2. Optionally, if the keystore contains expired trusted Java certificates for the
LDAPS server, delete the certificates:
where:
l LDAPS_server is the hostname or IP address of the LDAPS server.
l "password" is the Java trust keystore password.
3. Use the openssl command to obtain a copy of the CA certificate from the
LDAPS server:
where:
l LDAPS_server is the hostname or IP address of the LDAPS server.
l The openssl command may display two certificates. The last certificate is
usually the CA certificate.
Note
By default, a Windows host does not include the openssl program. The
OpenSSL website describes how to obtain an openssl program from a third
party provider.
Note
The openssl command may display two certificates. The second certificate is
usually the CA certificate.
where:
l LDAPS_server is the hostname or IP address of the LDAPS server.
l java_path is /usr/java/latest on UNIX. On Windows the latest
subfolder version is in the C:\Program Files\Java\JRExxx directory.
6. When prompted to trust the certificate, type Yes and press Enter.
7. Restart the NetWorker server after importing the new certificate into the
cacerts store file.
Note
This step is mandatory in order for the newly imported certificate to get
honored by the Authentication Service.
-D "config-object-class=objectclass"
-D "config-active-directory=n"
-D "config-search-subtree=y"
Note
When you define the config-server-address option, ensure that you specify
ldaps as the protocol and the appropriate LDAPS port number.
Error executing command. Failure: 400 Bad Request. Server message: Failed to
verify configuration config_name: Cannot resolve host
This error messages appears when the NetWorker Authentication Service cannot
resolve the host name of the LDAP or AD server specified in the config-server-
address option in the external authentication authority configuration.
To resolve this issue, perform the following tasks:
l Ensure that the NetWorker server can resolve the hostname and IP address of the
LDAP or AD server, and that the LDAP or AD server can resolve the hostname and
IP address of the NetWorker server.
l Ensure that the hostname or IP address that you specified in the config-server-
address option is correct.
Error executing command. Failure: 400 Bad Request. Server message: Failed to
verify configuration config_name: Error occurred while attempting to resolve
component name 'component_name'
This error message appears when the external authentication authority cannot
successfully validate the user or group search path that was specified in the external
authentication authority configuration.
To resolve this issue, correct the value defined in the config-user-search-path or
config-group-search-path option.
Error executing command. Failure: 400 Bad Request. Server message: Failed to
verify configuration config_name: Error occurred while attempting to resolve
component name 'component'
This error message appears when the external authentication authority cannot
successfully validate the base DN specified in the config-server-address.
To resolve this issue correct the base DN value that is defined in the config-server-
address option.
Note
You cannot use the authc_mgmt command to update user or group properties in the
LDAP or AD directory.
Procedure
1. Use the authc_config with the -e find-all-configs option to display a list of
existing configuration and determine the configuration ID for the external
authority in the local database:
For example:
2. Use the authc_config with the -e find-config option to determine the tenant
ID and domain name for the configuration:
3. Use the authc_config with the -e find-tenant option to determine the tenant
name that is associated with the tenant:
For example, to display information about a tenant with tenant ID 33, type:
4. Use the authc_mgmt command with one of the query options to query the
external authority database:
For example, to display the group membership for a specific user in the
iddconfig, perform the following steps:
a. If the username is not known, use the authc_mgmt command with the -e
query-ldap-users option to determine the username. For example, type:
authc_mgmt -u administrator -p "1.Password" -e query-ldap-
users -D "query-tenant=IDD" -D "query-domain=idddomain"
Administrator
cn=Administrator,cn=Users,dc=iddlab,dc=local
Konstantin cn=Konstantin,cn=Users,dc=iddlab,dc=local
Katherine cn=Katherine,cn=Users,dc=iddlab,dc=local
Viktoryia cn=Viktoryia,cn=Users,dc=iddlab,dc=local
Patrick cn=Patrick,cn=Users,dc=iddlab,dc=local
Liam cn=Liam,cn=Users,dc=iddlab,dc=local
Meghan cn=Meghan,cn=Users,dc=iddlab,dc=local
NetWorker cn=NetWorker,dc=iddlab,dc=local
Error executing command. Failure: I/O error on POST request for "
host":Connection to host refused; nested exception is
org.apache.http.conn.HttpHostConnectException: Connection to host refused
This error messages appears when the NetWorker Authentication Service cannot
connect to the LDAP or AD server by using the port number specified in the config-
server-address option in the external authentication authority configuration.
To resolve this issue, correct the port number defined in the config-server-address
option.
For example, to update the config-server-address value in the config-server-address
in the iddconfig configuration, type the following command:
Error executing command. Failure: 400 Bad Request. Server message: Failed to
perform LDAP task task: Cannot resolve host 'hostname'
This error messages appears when the NetWorker Authentication Service cannot
resolve the host name of the LDAP or AD server specified in the config-server-
address option in the external authentication authority configuration.
To resolve this issue, perform the following tasks:
l Ensure that the NetWorker server can resolve the hostname and IP address of the
LDAP or AD server, and that the LDAP or AD server can resolve the hostname and
IP address of the NetWorker server.
l Ensure that the hostname or IP address that you specified in the config-server-
address option is correct.
If required, update the config-server-address value. For example, to update the
config-server-address value in the config-server-address in the iddconfig
configuration, type the following command:
Note
Note
To manage users, the Console Security Administrator role requires that the user
account to also be a member of the Administrators group. If you do not add a
user with the Console Security Administrator role to an administrator group, the
user can only manage NMC Roles.
7. In the Password and Confirm Password fields, specify a password for the user
that meets the password policy settings that are defined for the environment.
The default password policy requires that the password meets the following
minimum requirements:
l Nine characters long
l One uppercase letter
l One lowercase letter
l One special character
l One numeric character
Note
Managing local database password policies describes how to change the default
password policy requirements.
When you do not select this option, the default password expiration policy is 90
days.
9. Optionally, to force the user to change the password at the next log in try,
enable the Password Change Required option.
10. Optionally, on the Permissions tab, define the NetWorker server hosts that the
user can manage. The Available Hosts field provides a list of NetWorker server
that this user cannot manage. The Managed Hosts field provides a list of
NetWorker servers that the user can manage. Use the Add, Add All, Remove,
and Remove All buttons to modify the list of NetWorker servers that the user
can manage.
Note
By default, a user can manage all the NetWorker servers in the Enterprise.
Note
The NetWorker Authentication Service requires the existence of at least one enabled
user that is a member of a local group with FULL_CONTROL permission. To provide
full control access to a group, type the following command:
Procedure
1. From the Console window, click Setup.
2. In the left pane, select Users.
3. Right-click the user and then select Delete.
4. Click Yes to confirm the deletion.
If the user had saved customized reports, a dialog box prompts for the
username to reassign to those reports. Otherwise, you can delete the reports.
Note
For example, to create a group that is named test, type the following command:
For example, to display information about a group named test, type the following
command:
authc_mgmt -u administrator -p "1.Password" -e find-group -D "group-
name=test"
Group Id : 132
Group Name : test
Group Details: New local database group
Group DN : cn=test,cn=Groups,dc=bu-
iddnwserver2,dc=IddLab,dc=local
Group Users : []
Note
You specify the group ID value when you create a user or add a user to an existing
group.
Creating users
Use the -e add-user option to create a user:
Note
For example, to create a user account Patd and add the account to a group named
test, type:
For example, to update the email address for the user account PatD, type the
following command:
For example, to view details about the user account PatD, type:
For example, to set the user-must-change-password option for the user Patd, type:
The user cannot manage the NetWorker Authentication Service until the password is
changed. For example:
The authc_mgmt UNIX man page and the EMC NetWorker Command Reference Guide
provides detailed information about all the configuration options.
Group Id : 164
Group Name : authgroup
Group Details:
Group DN : cn=authgroup,cn=Groups,dc=bu-
iddnwserver2,dc=IddLab,dc=local
Group Users : PatD
2. Use the -e add-permission option to add the FULL_CONTROL permission to the
authgroup:
Note
The output abbreviates the Group DN Pattern and Group DN values. Use the find-
permission option to see the complete value information.
The UNIX man page and the EMC NetWorker Command Reference Guide provides
detailed information about how to use authc_config to manage permissions.
where:
n "username" is the name of the user whose password you want to change, or
local administrator account.
n "current_password" is the current password for the username that you
specified.
n "new_password" is the new password for the username that you specified.
For example, to change the password for the local administrator account, type the
following command:
Note
To change the password without typing the new password in the command string,
do not include the -D password-new-value="new_password" option. The
command will prompt you for the new password and will not display the
characters.
l To use the administrator account to change the password for any user, use the -e
update-user option with the -D user-name and -D user-password options:
authc_mgmt -u administrator -p "current_password" -e update-user -D
user-name=username -D user-password="new_password"
where:
n "current_password" is the password for the administrator account.
n "username" is the name of the user whose password you want to change.
n "new_password" is the new password that you want to set for the user.
For example, to change the password for a local user who is named Noelle to
".Mynewpass1", type the following command:
The command displays the encoded text for the password value
"1.Password" : MS5QYXNzd29yZA==
{
"local_users": [
{
"user name": "administrator",
"password": "MS5QYXNzd29yZA=="
}]
}
4. Rename the authc-local-config.json.template file to authc-local-
config.json.
5. Copy the authc-local-config.json file to the Tomcat conf folder.
By default, the conf folder is/nsr/authc/conf on Linux and C:\Program
Files\EMC NetWorker\authc-server\tomcat\conf on Windows.
Note
If the NetWorker server is also the NMC server, start the NMC server
service. Type the following commands: net start gstd
l For Linux, type the following commands:
/etc/init.d/networker stop
/etc/init.d/networker start
When the NetWorker Authentication Service starts, the startup process checks
for the authc-local-config.json. If the file exists and the password
adheres to the minimum password policy requirements defined for a password,
the NetWorker Authentication Service resets the password. Review the
authc-server.log file for errors.
By default, the authc-server.log file is located in /nsr/authc/logs on
Linux and C:\Program Files\EMC NetWorker\authc\tomcat\logs on
Windows.
Note
8. Use the authc_mgmt command to confirm that you can connect to the
NetWorker Authentication Service with the new password.
For example:
Note
Option Id: 2
Name : TokenStartTimeDeltaInMinutes
Value : -15
TokenTimeoutInMinutes
The SAML token expiration timeout in minutes. The default value is 480 minutes (8
hours).
Note
Option Id: 3
Name : TokenTimeoutInMinutes
Value : 720
4. Click OK.
Note
If you change the Token Timeout value, you must restart the gstd service.
where option is one of the password policy options in the previous table.
For example, to change the default password expiration policy from 90 days to 30
days, type:
For example:
Note
The find-all-options operation does not display options that you have not
changed from the default values.
l To review the details about a specific option that has been modified from the
default value, type:
Argument Purpose
admin_service_default_proto Defines the web protocol to use when you connect to the
col NetWorker Authentication Service. The default value is https.
admin_service_default_url Defines the url to use when you connect to the NetWorker
Authentication Service. The default value is localhost.
admin_service_default_port Defines the port number to use when communicating with the
NetWorker Authentication Service. The default value is 9090.
admin_service_default_tenan Defines the tenant to use, to validate the username that you
t specify with the CLI command. When you use this option, you
do not require the -t argument to define a username that is
not in the Default tenant.
admin_service_default_user Defines the username that runs the CLI command. When you
use this option, you do not require the -u argument with the
CLI commands.
admin_service_default_passw Defines the password of the user that runs the CLI command.
ord When you use this option, you do not require the -p argument
with the CLI commands.
For example, to change the port to 9091, the connector port entry would
appear as follows:
<Connector port="9091"
protocol="org.apache.coyote.http11.Http11NioProtocol"
SSLEnabled="true"
the operations that are performed in the NetWorker Administration window. The
privileges that are assigned to an authenticated user on the NetWorker server are
based on the entries present in the Users or External roles attribute of the User Group
resources on the NetWorker server. User group membership defines which NetWorker
activities the user is authorized to perform. When you use token-based authentication,
NetWorker uses the External roles attribute in the User group resource to determine
user membership. When you do not use token-based authentication, NetWorker uses
the User attribute in the User group resource to determine membership.
Operations that you perform in the NMC GUI always use token-based authentication.
The privileges that are assigned to the user to perform NMC server operations, for
example adding new local database users are determined by user or group membership
in External roles attribute of the NMC Roles resources.
NMC server authorization provides more information about NMC roles.
Operations that you perform in the NetWorker Administration GUI always use token-
based authentication. As a result, NetWorker uses the users and groups that are
specified in the External roles attribute of a User Group to determine the privileges
that are assigned to the user that begins the operation.
User Group Management provides more information about the User Group resource.
Client-initiated backup and recovery authentication and authorization
To use token-based authentication with a command line (CLI) backup or recovery
operation on a NetWorker host, first run the nsrlogin command. When you run the
nsrlogin command, the NetWorker host contacts the NetWorker Authentication
Service to validate the user log in credentials. When the NetWorker Authentication
Service successfully validates the credentials, the application issues an authentication
token to the NetWorker host for the user account that you used to run the command.
The NetWorker host caches the token and confirms that the user account has the
appropriate privileges to perform the operation. The user account can perform secure
client-initiated backup and recovery operations with the authenticated user until the
token expires or a user runs the nsrlogout command.
Note
When you do not use the nsrlogin command to enable token-based authentication,
NetWorker uses the NetWorker 8.2.x and earlier authentication method. This
authentication method relies on operating system authentication to validate the user
privileges.
Token expiration
The token policies that are defined in the NetWorker Authentication service database
determine how long a token remains valid:
l When the token for a CLI authenticated user expires, in-progress user-initiated
operations complete, but the user cannot start new operations until a new token is
issued to the user. To issue a new token for a CLI operation, the user must run the
nsrlogin command again.
l When the token expires while a user is connected to the NetWorker
Administration window, a token expiration message appears and the connection
to the NetWorker server closes. A prompt appears requesting that the user
specify their password and generate a new token. After a new token is issued, the
user can re-establish the connection to the NetWorker server.
l When the token expires while a user is connected to the NMC GUI, a token
expiration message appears and the user is prompted to specify their password
and generate a new token. After a new token is issued, the user can use the NMC
GUI.
User authorization
User authorization settings control the rights or permissions that are granted to a user
and enable access to a resource managed by NetWorker.
Note
Console User All tasks except for those tasks that are explicitly mentioned for the
Console Security Administrator and the Console Application
Administrator.
Tasks include:
tenant_name\domain_name\user_name
where:
l tenant_name is the name of the tenant that you specified when you
configured the external authentication authority configuration on the
NetWorker Authentication Service. If you use the Default tenant, you are
not required to specify the tenant name.
User authorization 53
Access Control Settings
l domain_name is the name of the domain that you specified when you
configured the external authentication authority configuration on the
NetWorker Authentication Service.
l user_name is the name of the user in the LDAP or AD directory, which you
added to the External Roles attribute or is a member of the group that you
added to the External Roles attribute.
User authorization 55
Access Control Settings
User authorization 57
Access Control Settings
Server authorization
The NetWorker server provides a mechanism to authorize users that perform
operations from a command prompt and from the NMC GUI.
Note
If this user account has console security administrator privileges, the NMC server by
default grants permission to all hosts and editing is disabled.
Procedure
1. From the Console window, click Setup.
2. In the left pane, click Users.
3. Right-click a user, then select Permissions. The Edit User window appears and
the Permissions tab displays.
4. To grant the user privileges to view various hosts, use the arrow keys to select
the allowed hosts.
5. Click OK.
Results
When you restrict the NMC view for a user, then you limit what a user can see in the
NMC windows:
User authorization 59
Access Control Settings
l In the Enterprise window—The user sees all the hierarchy folders, but only the
allowed NetWorker servers appear in the folders.
l In the Events window—The user sees only events from allowed NetWorker
servers.
l In the Reports window—The user only sees reporting data from allowed
NetWorker servers and as a result, reports can vary among users. For example, a
shared backup summary report entitled “Building C Backups” displays different
data for different users (even when each user runs the report simultaneously)
when the privileges of the users include different NetWorker servers. This applies
to all report types.
Note
A NetWorker server only appears in a list of reports when there is data available on
which to report.
l In the Setup window:
n The user sees properties for all users, in addition to its own properties and
privileges.
n The user can modify its own properties, but not privileges. Only the Console
Security Administrator can view and modify user privileges.
l User groups
l Security Audit log resource
l Server resource
Note
l User groups
l Audit log resource
l Server resource
Note
Delete Security Settings The ability to delete user created user groups. You cannot
delete preconfigured user groups.
Note
User authorization 61
Access Control Settings
Note
Configure NetWorker The ability to configure resources that are associated with the
NetWorker server, storage nodes, and clients. For example
creating, editing, and deleting resources.
Note
Note
Note
Users can only recover files with the user privileges for that
operating system. To perform save set or NDMP recoveries,
users with the privilege must log in to the local host as root
(UNIX) or administrator (Windows).
Users can only back up files with the user privileges for that
operating system. To run the
nsrpolicy command or to perform NDMP backups, users
with this privilege must log in to the local hosts as root (UNIX)
or administrator (Windows). To allow scheduled backups to
operate correctly, the root user (UNIX) or administrator
(Windows) on the client has this privilege automatically.
User authorization 63
Access Control Settings
Note
Note
Note
Note
Recover Remote Data Allows users to recover data for a back up performed on
another server.
Note
User authorization 65
Access Control Settings
Note
Note
6. In the External roles attribute, specify the dn of the users and groups.
Modifying User Group membership for NMC and secure CLI operations provides
more information.
7. In the Privileges attribute, select the privileges to assign to the user group.
8. Click OK.
User authorization 67
Access Control Settings
Note
Note
When you restrict user group membership to users and groups in the External
Roles attribute only, use the nsrlogin command to authenticate the user before
you run NetWorker CLI commands.
l NetWorker module applications, such as NMDA and NMM do not use token-based
authentication and rely on GSS to authenticate OS users. Use the User attribute
to manage OS user and group membership for GSS authentication.
Note
When a user belongs to many operating system groups, the total number of
characters for all the group names can exceed the buffer size that NetWorker
users to store the group names. NetWorker excludes characters and group names
that exceed the buffer size. If you add a group to Users attribute that is not in the
buffer for a userid, NetWorker does not consider the user to be a member of the
User Group.
Note
EMC recommends that you specify usernames when your user accounts are a
member of a large number of groups.
User authorization 69
Access Control Settings
4. On the String Attribute Editor window, with the entire dn highlighted, right-click
in the value field and select Copy. The following figure provides an example of
copying the group DN in the ADSI Editor.
Figure 10 Copying the group DN
"query-tenant=IDD" -D
"query-domain=ldapdomain"
User authorization 71
Access Control Settings
For example, to specify a user who is named patrick on a host that is named
jupiter, enter this line in the Users attribute: user=patrick,host=jupiter or
user=patrick,host=jupiter.emc.com
Note
The formats user@host, host and user, and similar formats are ambiguous as to
whether host or domain is intended. EMC recommends that you use the
name=value format.
Note
EMC recommends that you specify usernames when your user accounts are a
member of a large number of groups.
operations and NetWorker module operations might fail due to insufficient privileges.
To resolve this issue, use the nsrlogin command to contact the NetWorker
Authentication Service and authenticate a user. When user authentication succeeds,
the NetWorker Authentication Service issues a token to the NetWorker host for the
user, which provides CLI operations with token-based authentication until the token
expires.
Before you begin
Ensure that the user that the NetWorker Authentication Service validates has the
appropriate User Group privileges to run the CLI commands.
Perform the following steps on a NetWorker client on which you initiate the CLI
commands, or the requesting host.
Procedure
1. Use the nsrlogin command to validate a user and generate a token for the
user:
where:
l -s NetWorker_server—Specifies the name of the NetWorker server. Use
this option when you use the nsrlogin command on a NetWorker host that
is not the NetWorker server.
l -H authentication_host—Specifies the name of the NetWorker
Authentication Service host. Use this option when you use the nsrlogin
command on a NetWorker host that is not the NetWorker server. This option
is only required when you do not use the -s option.
l -P port—Specifies the NetWorker Authentication Service port number.
Use this option when you do not use the -s option and when the NetWorker
Authentication Service does not use the default port number 9090 for
communications.
l -t tenant— Specifies the tenant name that the NetWorker Authentication
Service should use to verify the username and password. When you omit this
option, NetWorker Authentication Service uses the Default tenant to verify
the user credentials.
l -d logindomain—Specifies the domain name that the NetWorker
Authentication Service should use to verify the username and password with
an external authentication authority. When you omit this option, the
NetWorker Authentication Service uses the local user database to verify the
user credentials.
l -u username—Specifies the username that the NetWorker Authentication
Service should validate to generate a token.
l -p "password"—Specifies the password that the NetWorker
Authentication Service should use to verify the username. If you do not
specify the password, the nsrlogin command prompts you to provide the
password.
For example, to generate a token for user Konstantin in the idddomain domain
and the idd tenant, type the following command:
Authentication succeeded.
User authorization 73
Access Control Settings
Results
The CLI command uses the authenticated token, until the token expires. By default
the token expiration period is 4800 minutes, or 8 hours. When the token expires and
the user tries to run a CLI command, the command fails with a permissions error and a
message similar to the following appears to indicate that the token has expired:
Security token has expired
To resolve this issue, run the nsrlogin command again to generate a new
authenticated token.
Note
To revoke the user token and enable the CLI commands to use the Users attribute in
the Usergroups resources to authenticate users, use the nsrlogout command. The
nsrlogout UNIX man page and the EMC NetWorker Command Reference Guide
provides detailed information about the nsrlogout command.
Unable to connect to server: Unable to set user privileges based on user token for
SYSTEM: security token has expired
This message appears when the NetWorker Administration window is open and the
token expires for the authenticated user.
To resolve this issue:
1. Click OK. The NetWorker Administration window closes.
2. In the Console GUI, select the NetWorker server, and then select Launch
NetWorker Administration. The Enter Credentials window appears.
3. In the Enter Credentials window, specify the password of the user, and then click
OK. The NetWorker Authentication Service validates the user credentials and if
the validation succeeds, generates a new token for the session.
Unable to query resource database: security token has expired
This message appears when you run a CLI tool as an authenticated user but the user
token has expired.
To resolve this issue, run the nsrlogin command to generate a new token for the
user.
gstauthcfg -c -t -h New_authentication_service_hostname -p
port_number
Note
5. To establish the trust, type the following command on each NetWorker server
that is not local to the NetWorker Authentication Service that NMC uses for
authentication:
nsrauthtrust -H Authentication_service_host -P
Authentication_service_port_number
where:
l The location of the nsrauthtrust command differs on Linux and
Windows:
n Linux—/usr/sbin
n Windows—C:\Program Files\EMC NetWorker\nsr\bin
l Authentication_service_host is the hostname of the NetWorker server that
authenticates the NMC server host.
l Authentication_service_port_number is the port number used by the
NetWorker Authentication Service. The default port number is 9090.
For example:
nsrauthtrust -H nwserver.emc.com -P 9090
nsraddadmin -H Authentication_service_host -P
Authentication_service_port_number
For example:
nsraddadmin -H nwserver.emc.com -P 9090
Note
If you do not create the service account, the NMC server cannot monitor
events or gather reporting data from the managed NetWorker servers.
Component authentication
NetWorker hosts and daemons use the nsrauth mechanism to authenticate
components and users, and to verify hosts. The nsrauth GSS authentication
mechanism is a strong authentication that is based on the Secure Sockets Layer
(SSL) protocol.
Note
HP-UX depends on the OpenSSL library available on the operating system. OpenSSL
0.9.8e or later is required for NetWorker modules to function correctly.
Following version SSLv3, SSL was renamed to Transport Security Layer (TLS)
starting with TLSv1. For Windows, nsrauth uses the SSL/TLS protocol that is
implemented by RSA BSAFE. For UNIX and Linux, nsrauth uses the SSL/TLS protocol
that is implemented by the OpenSSL library. NetWorker 9.1 uses TLSv1.2. Earlier
NetWorker versions that have not been updated use TLSv1.0.
The nsrexecd service on each NetWorker host provides the component
authentication services. The first time the nsrexecd process starts on a host, the
process creates the following unique credentials for the host:
l 2048-bit RSA private key
l 1024-bit RSA private key, for backward compatibility
l Self-signed certificate or public key
l NW Instance ID
l my hostname
NetWorker stores these credentials in the NSRLA resource found in the local
NetWorker client database, nsrexec. These credentials are known as local host
authentication credentials. NetWorker uses the local host authentication credentials
to uniquely identify the host, to other NetWorker hosts in the datazone.
When a NetWorker host communicates with other NetWorker hosts, the nsrauth
process creates a NSR Peer Information resource in the nsrexec database of the
target host that contains local host authentication credentials for the initiating host.
When a NetWorker host initiates a session connection to another host, the following
steps occur.
1. The nsrexecd daemon on the initiating host contacts the nsrexecd daemon on
the target host.
2. The nsrexecd daemon on the initiating host sends the local host authentication
credentials to the target host.
3. The target host compares the local host authentication credentials with the
information that is stored in the local NSR Peer Information resource.
l If the information provided by the initiating host matches the information that
is stored in the NSR Peer Information resource on the remote host, then the
nsrexecd daemon creates a session key and establishes a SSL connection
between the two hosts. NetWorker uses AES-256 bit encryption to encrypt
the data that is exchanged between the two hosts.
l If the information provided by the initiating host does not match the
information that is stored in the NSR Peer Information resource on the
remote host, then the remote host requests the certificate from the initiating
host.
n If the certificate provided by the initiating host matches the certificate that
is stored on the remote host, then the nsrexecd daemon creates a session
key and establishes an SSL connection between the two hosts. NetWorker
uses AES-256 bit encryption to encrypt the data that is exchanged between
the two hosts.
n If the certificate provided by the initiating host does not match the
certificate that is stored on the remote host, NetWorker drops the
connection between the two hosts.
l If the remote host does not contain a NSR Peer Information resource for the
initiating host, the remote host uses the information that is provided by the
initiating host to create a NSR Peer Information resource. NetWorker uses
the session key to establish an SSL connection between the two hosts.
Component authentication uses the AES-256 bit encryption method.
Note
nsradmin -p nsrexec
. type: NSRLA
3. Display the NSRLA resource and view the current settings for the administrator
attribute:
4. Update the value of the administrator attribute to include the owner of the gstd
process on the NMC server:
append administrator:"user=gstd_owner,host=NMC_host"where:
l gstd_owner is the user account that starts the gstd daemon on UNIX or the
EMC GST service on Windows. By default, the process owner is the
SYSTEM user on Windows and is the root user on UNIX.
l NMC host is the hostname of the NMC server.
For example, to add the SYSTEM account on a Windows NMC server that is
named win.emc.com to a UNIX NetWorker client named unix.emc.com, type:
IP_Address[mask], authentication_method[/
authentication_method]...
where:
l IP_Address[mask] is a single IP address, a single host name, or an IP address
and netmask range. You can specify the number of bits for the mask value or
use the full subnet mask address.
Component authentication 79
Access Control Settings
Note
For example:
l To configure host mnd.emc.com to only use nsrauth when communicating
with the host, type:
mnd.emc.com,nsrauth
l To configure all hosts on the 137.69.168.0 subnet to only use nsrauth when
communicating with the host, type:
137.69.160.0/24, nsrauth
l To configure all hosts in the datazone to use nsrauth when communicating
with the host except for a host with the IP address 137.69.160.10, which
should try oldauth first, type the following two lines:
137.69.160.10, oldauth/nsrauth
0.0.0.0, nsrauth
4. Click OK.
5. Restart the NetWorker services or daemons on the target host.
nsradmin -p nsrexec
. type: nsrla
Where:
l IP_Address[mask] is a single IP address, a single host name, or an IP address
and netmask range. You can specify the number of bits for the mask value or
use the full subnet mask address.
l authentication_method is nsrauth, for strong authentication or oldauth for
legacy authentication.
Note
For example:
l To configure host mnd.emc.com to only use the nsrauth when
communicating with the host, type:
Component authentication 81
Access Control Settings
2. In the Hosts pane, right-click the target host and select Configure Local
Agent.
3.
On the Advanced tab, in the NW instance info operations attribute, select
Export.
4. In the NW instance info file attribute, specify the path and name of the file
that contains the exported information.
For Windows paths, use a forward slash (/) when you specify the path. For
example, when the mnd_credentials.txt file is in c:\users, specify: c:/
users/mnd_credentials.txt.
5. Click OK.
Results
NetWorker exports the local host credential information to the file you specify, on the
target host.
Note
If you do not specify a path to the file, NetWorker creates the export file in the C:
\Windows\system32 directory on a Windows host and in the /nsr/cores/
nsrexecd directory on a UNIX host.
nsradmin -p nsrexec
. type: NSRLA
For Windows paths, use a forward slash (/) when you specify the path.
For example, when the mnd_credentials.txt file is in c:\users, specify:
c:/users/mnd_credentials.txt.
Results
NetWorker exports the local host credential information to the file you specify, on the
target host.
nwinstcreate -ix
Component authentication 83
Access Control Settings
this issue, import a copy of the local host credentials for the host into the local NSRLA
resource. This workaround ensures that the local host credentials for the host match
the information that is stored in the NSR Peer Information resource on all other
hosts in the datazone. Resolving NSR Peer Information conflicts describes how to
resolve this issue if an exported copy of the local host credential information is not
available.
Importing local host credentials by using NMC
Connect to the NetWorker server with NMC and import the local host credentials.
Before you begin
The account that you connect to the NetWorker server must have permission to
access the NSRLA database on the target host.
Procedure
1. Copy the file that contains the exported local host credentials to the target
host.
2. On UNIX platforms, ensure that the root user has read and write permissions
for the credential file.
For example: chmod 600 export_file_name
3. On the Administration window, select Hosts.
The Hosts Management window appears.
4. In the Hosts pane, right-click the target host and select Configure Local
Agent.
5. On the Advanced tab, in the NW instance info operations attribute, select
Import.
6. In the NW instance info file attribute, specify the path and name of the file
that contains the exported information.
For Windows paths, use a forward slash (/) when you specify the path.
For example, when the mnd_credentials.txt file is in c:\users, specify:
c:/users/mnd_credentials.txt.
7. Click OK.
Results
NetWorker imports the local host credential information to the target host.
Importing localhost credentials by using nsradmin
Use the nsradmin program to import local host credentials from a file into the
NSRLA resource of a host.
Before you begin
Connect to the target host with an account that has administrator access to the
NSRLA database. You must configure access privileges to the NetWorker client
database.
Procedure
1. Copy the file that contains the exported local host credentials to the target
host.
2. On UNIX platforms, ensure that the root user has read and write permissions
for the credential file.
For example: chmod 600 export_file_name
nsradmin -p nsrexec
. type: NSRLA
For Windows paths, use a forward slash (/) when you specify the path.For
example, when the mnd_credentials.txt file is in c:\users, specify: c:/
users/mnd_credentials.txt.
For example, when the mnd_credentials.txt file is in c:\users, specify:
c:/users/mnd_credentials.txt.
quit
Component authentication 85
Access Control Settings
Procedure
1. Copy the file that contains the exported local host credentials to the target
host.
2. Use NMC to connect to the NetWorker server.
3. On the View menu, select Diagnostic mode.
4. On the Administration window, select Hosts.
The Hosts Management window appears.
5. Right-click the target host and then select Host Details.
6. In the Certificates pane, right-click and select New.
7. On the Create certificate window, in the Change certificate drop-down list,
select Load certificate from file.
8. In the Name field, type the Name value from the credential file.
9. In the Instance ID field, type the NW Instance ID value from the credential file.
10. In the Peer Hostname field, type the My Hostname value from the credential
file.
11. In the Change certificate drop-down, select Load certificate from file.
12. In the Certificate file to load attribute, specify the path and name of the file
that contains the exported local host credentials.
For Windows paths, use a forward slash (/) when you specify the path. For
example, when the mnd_credentials.txt file is in c:\users, specify: c:/
users/mnd_credentials.txt.
13. On UNIX platforms, ensure that the root user has read and write permissions
for the credential file.
For example: chmod 600 export_file_name
14. Click OK.
Creating the NSR Peer Information by using nsradmin
Use the nsradmin program on a host to create an NSR Peer Information resource for
a host.
Before you begin
Connect to the target host with an account that has administrator access to the
NSRLA database. You must configure access privileges to the NetWorker client
database.
Procedure
1. Copy the file that contains the exported local host credentials to the target
host.
2. Connect to the nsrexec database:
nsradmin -p nsrexecd
where:
l hostname is value that appears in the Name attribute in the credential file.
l NW_instance_id is the value that appears in the NW Instance ID attribute in
the credential file.
l my_hostname is the value that appears in the My hostname attribute in the
credential file.
6. Update the new NSR Peer Information resource to use the exported
certificate:
For Windows paths, use a forward slash (/) when you specify the path. For
example, when the mnd_credentials.txt file is in c:\users, specify: c:/
users/mnd_credentials.txt.
7. When prompted to update the resource, type Yes.
8. Display the hidden properties:
option hidden
Note
You cannot use NMC to delete the NSR Peer Information resource for a NetWorker
host that does not have an existing client resource that is configured on the
NetWorker server.
Component authentication 87
Access Control Settings
Procedure
1. On the Administration window, select Hosts.
The Hosts Management window appears.
2. Right-click the NetWorker host with the NSR Peer Information resource that
you want to delete and select Host Details.
Note
The NetWorker host does not appear in the Local Hosts section when a client
resource does not exist on the NetWorker server.
Results
The target host creates a new NSR Peer Information resource for the initiating host
the next time that the initiating host attempts to establish a connection with the
target host.
Deleting the NSR Peer Information resource by using nsradmin
Use the nsradmin command on the target host to delete the NSR Peer Information
resource for the initiating host.
Before you begin
Connect to the target host with an account that has administrator access to the
NSRLA database. You must configure access privileges to the NetWorker client
database.
Procedure
1. Connect to the nsrexec database:
nsradmin -p nsrexec
2. Set the query type to the NSR Peer Information resource of the initiating host:
show
4. Print the attributes for the NSR Peer Information resource and confirm that
the name and peer hostname attributes match the hostname of the initiating
host:
delete
quit
Results
The target host creates a new NSR Peer Information resource for the initiating host
the next time that the initiating host attempts to establish a connection with the
target host.
Resolving conflicts between the local host credentials and NSR Peer Information resource
After two NetWorker hosts successfully authenticate each other, the target host
creates an NSR Peer Information resource to store the local host credentials of the
initiating host. The target host uses attributes that are stored in the NSR Peer
Information resource to validate connection requests from the target host. When
unexpected data loss or corruption occurs in the NSRLA resource of the initiating
host, the nsrexecd process creates new local host credentials. When a host with new
local host credentials attempts to connect another host, the target host rejects the
connection request if an NSR Peer Information resource exists for the initiating host
because the credentials do not match the contents of the NSR Peer Information
resource.
When the local host credentials change for a host, all target hosts that have had a
prior connection with the host rejects a connection attempt. To resolve this issue,
type the following command to remove NSR Peer Information resources from the
nsrexec database:
nsradmin -s NetWorker_server -p nsrexec -C -y "NSR peer information"
where you specify the -s NetWorker_server option when you type the command
from the target host.
Alternately, perform the following steps:
l Manually delete the NSR Peer Information resource for the initiating host in the
NetWorker client database of each target host.
Note
If the NetWorker server is the initiating host, delete the NSR Peer Information
resource on each host in the datazone.
l Import a backup copy of the local host credentials on the initiating host.
Component authentication 89
Access Control Settings
nsradmin -p nsrexec
2. Set the query type to the NSR Peer Information resource of the initiating host:
option hidden
4. Print the attributes for the NSR Peer Information resource and confirm that
the name and peer hostname attributes match the hostname of the initiating
host:
5. Update the new NSR Peer Information resource to use the exported
certificate:
For Windows paths, use a forward slash (/) when you specify the path. For
example, when the mnd_credentials.txt file is in c:\users, specify: c:/
users/mnd_credentials.txt.
6. When prompted to update the resource, type Yes.
7. Display the hidden properties:
option hidden
Component authentication 91
Access Control Settings
Results
NetWorker generates a new certificate for the NetWorker host. Delete all existing
Peer Information resources for the host, on other NetWorker hosts. Deleting the
Peer information resource describes how to delete the resource.
Component authorization
NetWorker provides you with the ability to restrict remote program executions or
client-tasking rights on a NetWorker host.
You can also:
l Define users that can access the data of a NetWorker host and recover the data to
a different NetWorker host.
l Restrict client-initiated backups to the NetWorker server.
l Configure the NetWorker server to prevent the start up of new save and recover
sessions.
Scheduled backup Add the FQDN and shortname of the NetWorker server.
For a clustered NetWorker server, add the long and
shortname of the virtual NetWorker and all physical nodes.
Remote directed recovery Add the FQDN and shortname of the administering client to
the servers file on the destination client.
NDMP DSA backup Add the FQDN and shortname of the NetWorker client that
starts the backup.
The software installation process on Windows and Solaris allows you to specify a list
of hosts to add to the servers file. To change the servers file after the installation
completes or to specify hosts on operating systems that do not allow you to configure
the file during the installation process, use a text editor to edit the servers file. The
servers file resides in the following locations:
l On UNIX and Mac NetWorker hosts:/nsr/res
l On Windows NetWorker hosts:NetWorker_installation_path\res
When you add a NetWorker host to the servers file, ensure that you perform the
following tasks:
l Specify the FQDN for the host.
l Specify one hostname on each line.
l Restart the nsrexecd service on the host, after you save the file.
Note
If the servers file is empty or does not exist, then any NetWorker host has client-
tasking rights to the host.
On UNIX computers, you can start the nsrexecd daemon with the -s servername
option to assign client-tasking rights to a host. The use of the -s option to start the
nsrexecd daemon supersedes the use of the servers files to restrict client-tasking
rights.
Note
Component authorization 93
Access Control Settings
5. Click OK.
Component authorization 95
Access Control Settings
This chapter describes how to access and manage the logs files available in
NetWorker.
Log Settings 97
Log Settings
Windows:
Windows:
NetWorker server generated Log file name and location that is defined by UNIX only, OS log file.
syslog the system log configuration file.
Note
messages local0.notice and
local0.alert NetWorker does not modify the
syslog.conf file to configure
local0.notice and local0.alert.
Vendor specific documentation
describes how to configure
local0.notice and local0.alert
Windows:
Windows:
Windows:
Windows:
Windows:
Windows:
Window:
C:\Program Files\EMC
NetWorker\Management
\logs\gstd.raw
Windows:
C:\Program Files\EMC
NetWorker\Management
\logs
\gstdbupgrade.log
Windows:
C:\Program Files\EMC
NetWorker\Management
\logs\web_output
Windows:
C:\Program Files\EMC
NetWorker\Management
\nmcdb\pgdata
\db_output
Windows Bare Metal The following files in the X: Contains the recovery
Recovery (BMR) \Program Files\EMC workflow of the
NetWorker\nsr\logs\ DISASTER_RECOVERY:\ and
directory: any errors that are related to
recovering the save set files
ossr_director.raw
or Windows ASR writer
errors. Use the
nsr_render_log program
CloudBoost - NetWorker The following log files in the These files appear on a client
client direct-enabled NetWorker
/nsr/logs/cloudboost
client and contain information
directory: about data stored on a
CloudBoost device. The
MagFS.log.ERROR.date- severity of the message
timestamp.pid.txt determines which log file that
MagFS.log.FATAL.date- error message is written to.
timestamp.pid.txt The maximum size of the log
MagFS.log.INFO.date- files are 100 MB.
timestamp.pid.txt Before a client direct backup,
the save process
checks the size of the file.
When the maximum size
is reached, save starts an
automatic trimming
mechanism, which renames
and compresses the log file.
The maximum number of
versions for a file is 10. When
Note
CloudBoost - CloudBoost The following log files in These files appear on the
Appliance the /nsr/logs/cloudboost CloudBoost appliance and
directory: contain information about
operations performed on a
MagFS.log.ERROR.date-
CloudBoost device. The
timestamp.pid.txt
severity of the message
MagFS.log.FATAL.date- determines which log file that
timestamp.pid.txt error message is written to.
where:
n raw_filename is the name of the unrendered file. For example, daemon.raw
n output_filename is the name of the file to direct the output to
n -c suppresses the category
n -m suppresses the message ID
n -e suppresses the error number
n -a suppresses the activity ID
n -p suppresses the process ID
n -t suppresses the thread ID
where:
n hostname is the name of the host that contains the .raw file.
n raw_filename is the name of the unrendered file. For example, daemon.raw
n output_filename is the name of the file to direct the output to
n -c suppresses the category
n -e suppresses the error number
n -m suppresses the message ID
n -p suppresses the process ID
n -a suppresses the activity ID
n -t suppresses the thread ID
n -h suppresses the hostname
n -y suppresses the message severity
l To render a .raw file and only view log file messages for a specific device, type:
nsr_render_log -c -empathy -F devicename raw_filename
1>output_filename 2>&1
l To render a .raw file and only view certain messages severities, type:
nsr_render_log -c -empath -Y message_severity 1>output_filename
2>&1
where message_severity is one of the severity types listed in the following table.
Table 13 Message types
Type Description
Informational Information that may be useful, but does not require any specific action.
Warning A temporary problem that NetWorker software may resolve or prompt you to
resolve.
Critical Errors that you are required to resolve, to ensure successful NetWorker
operations.
Type Description
Severe Errors that cause NetWorker services to become disabled or dysfunctional.
The UNIX man page and the EMC NetWorker Command Reference Guide provides
detailed information about the nsr_render_log program and the available
options.
nsradmin -p nsrexec
5. Use the Runtime rendered log attribute to define the path and file name for
the rendered log file.
For example, to save rendered messages to the file rendered.log in the
default NetWorker logs directory on a Windows host, type:
Table 14 Raw log file attributes that manage log file size
Attribute Information
Maximum size MB Defines the maximum size of the log files.
Default: 2 MB
Maximum versions Defines the maximum number of the saved log files.
Default: 10
Runtime rollover by size When set, this attribute invokes an automatic hourly check of
the log file size.
Default: disabled
Runtime rollover by time When set, this attribute runs an automatic trimming of the log
file at the
defined time, regardless of the size. The format of the variable
is
HH:MM (hour:minute).
Table 14 Raw log file attributes that manage log file size (continued)
Attribute Information
Default: undefined
Note
How the trimming mechanism trims the log files differs depending on how you define
the log file size management attributes. The following table summarizes the trimming
behavior.
Table 15 Raw log file attributes that manage the log file trimming mechanism
Note
When you do not configure runtime rollover l NetWorker checks the log file size when
by time or runtime rollover by size the nsrexecd process starts on the
computer.
l When the log file size exceeds the size
that is defined by the maximum size MB
attribute, NetWorker renames the
existing log file to
log_file_name_date_time.raw then
creates a new empty log file.
Note
Table 15 Raw log file attributes that manage the log file trimming mechanism (continued)
Managing raw log file size for the daemon.raw, networkr.raw, and gstd.raw files
To configure the NetWorker software to rollover the .raw file by time, perform the
following steps.
Procedure
1. Log in to the NetWorker host with root on UNIX or in to Administrator for
Windows.
2. Use the nsradmin program to access the NSRLA database:
nsradmin -p nsrexec
6. Update the runtime rollover by time attribute with the time that you want to
rollover the log file.
For example, to configure the gstd.raw file to rollover at 12:34 AM, type:
Note
In NetWorker 8.0 and later, the Security Audit Log feature provides the NetWorker
server and the NMC server with the ability to log specific security audit events that
are related to their operations.
Procedure
1. From the Administration window, select Server.
2. Start the daemon from a command prompt and specify the troubleshoot level.
For example:
l To start the nsrexecd daemon in troubleshoot mode, type:
source /opt/nsr/admin/networkerrc
source /opt/nsr/admin/nsr_serverrc
nsrctld -D9 1>filename2>&1
Where filename is the name of the text file that NetWorker uses to store the
troubleshoot messages.
3. After you collect the necessary troubleshoot information, perform the following
steps:
a. Stop the NetWorker processes by using the nsr_shutdown command.
b. Restart the processes by using the NetWorker startup script:
/etc/init.d/networker start
l On HP-UX, type:
/sbin/init.d/networker start
l On AIX, type:
/etc/rc.nsr
c. Click Start.
4. To put the nsrd process in troubleshoot mode:
a. Right-click the NetWorker Backup and Recover service and select
Properties.
b. In the Startup Parameters field, type -D x.
where x is a number between 1 and 99.
c. Click Start.
Results
NetWorker stores the troubleshoot information in the daemon.raw file.
After you finish
After you capture the troubleshoot information, stop the NetWorker services, remove
the -D parameter, and then restart the services.
2. Edit the file and specify the following at beginning of the file:
GST_DEBUG=x
export GST_DEBUG
then
/etc/init.d/gst start
l AIX: Type:
/etc/rc.gst start
then
/etc/rc.gst stop
Results
NMC stores the troubleshoot information in the gstd.raw file.
After you finish
After you capture the troubleshoot information, stop the gstd daemon, remove the
environment variable from the startup file, and then restart the gstd daemon.
Note
If you do not see the PID for each process on the Process tab, browse to
View > Select Columns, and then select PID (Process Identifier)
l On UNIX, use the ps command. For example, type ps -ef | grep nsr
to get a list of all the NetWorker processes that start with nsr.
where:
l PID is the process id of the process.
l x is a number between 0 and 9.
Note
Results
NetWorker logs the process troubleshoot information in the daemon.raw file.
After you finish
To turn off troubleshoot, type:
where:
l x is a number between 1 and 99.
l file_sytem_objects is the name of the files or directory to backup.
l filename is the name of the file that stores the troubleshoot information.
Note
The EMC NetWorker Command Reference Guide provides detailed information about all
the available backup options and how to use the save command.
Note
2. Use the Recovery wizard to create or modify the recover job. On the Select
the Recovery Options window, select Advanced Options.
3. In the Debug level attribute, select a troubleshooting level between 0 and 9.
c. Make note of the values in the recover, recovery options, and recover
stdin attributes. For example:
recover command: recover;
recover options: -a -s nw_server.emc.com -c mnd.emc.com
-I - -i R;
recover stdin:
“<xml>
<browsetime>
May 30, 2013 4:49:57 PM GMT -0400
</browsetime>
<recoverpath>
C:
</recoverpath>
</xml>”;
where:
l nw_server.emc.com is the name of the NetWorker server.
l mnd.emc.com is the name of the source NetWorker client.
3. Confirm that the nsrd process can schedule the recover job:
a. Update the Recover resource to start the recover job:
update: name: recover_resource_name;start time: now
where recover_resource_name is the name of the Recover resource.
d. When the recover command completes, review the recover output for
errors. If the recover command fails, then review the values that are
specified in the Recover resource for errors.
7. Use the jobquery command to review the details of the Recover job. From a
command prompt on the NetWorker server, type: jobquery
8. From the jobquery prompt, perform one of the following steps:
l Set the query to the Recovery resource and display the results of all
recovery jobs for a Recovery resource:
Where jobid is the jobid of the Recover job that you want to review.
Note
Review the daemon.raw file on the NetWorker server to obtain the jobid for
the recovery operation.
where:
l x is a number between 1 and 99.
l file_sytem_objects is the name of the files or directory to recover.
l filename is the name of the file that stores the troubleshoot information.
Note
The EMC NetWorker Command Reference Guide provides detailed information about all
the available recovery options and how to use the recover command.
Windows:
Refer to the Apache website for detailed information about the Apache Tomcat log
files.
Note
After you make changes to the log4j.properties file, you must stop and start the
NetWorker Authentication Service daemon to reset the configuration settings.
Note
After you make changes to the authc-cli-log4j.properties file, you must stop
and start the NetWorker Authentication Service daemon to reset the configuration
settings.
This chapter describes how to ensure NetWorker uses secure channels for
communication and how to configure NetWorker in a firewall environment.
Service ports
The TCP server processes that run on each NetWorker host use service ports to listen
for inbound connections. Service ports are also known as listener ports or destination
ports.
NetWorker uses two types of service ports:
l Fixed ports—NetWorker uses two fixed ports: TCP/7937 and TCP/7938. Include
these ports in the service port range of each NetWorker host. NetWorker uses
these ports to start connections.
l Variable ports—NetWorker dynamically opens ports. A NetWorker host can
allocate any port in the defined service port range and the NetWorker daemons
select the dynamic ports within that range randomly. The default range is
7937-9936 and you can narrow or expand this range.
To increase security in the environment, reduce the variable ports range to specify
only the minimum number of service ports that the NetWorker software requires. The
minimum value depends on the installation type and the number of hosted NetWorker
devices. NetWorker stores the service port range for a host in the NSR Local Agent
(NSRLA) resource in the NetWorker client database (nsrexec).
Connection ports
NetWorker processes use connection ports to connect to a service. The NetWorker
software requires one connection port for any type of communication between the
client, storage node, and server. Connection ports are also known as communication
ports, source ports, or outbound ports.
NetWorker uses a default range, 0-0, to indicate that the NetWorker software allows
the operating system to select the port for TCP clients. The operating system
reserves connection ports for short-term use and reuses the ports as needed. The
operating system might allow you to configure the dynamic port range, for example,
by using the netsh program on Windows. NetWorker does not require changes to this
range and EMC recommends that you use the default dynamic port range.
The use of the default port range does not cause security concerns. EMC
recommends that you do not change the range for any NetWorker hosts in the
datazone. NetWorker performance problems or random malfunctions can occur when
the range is too narrow.
Note
If the firewall time out is shorter than the common 1 hour value, further decrease
these values. The network overhead as a result of enabling TCP KeepAlive is minimal.
The following table summarizes the Wait Time Before Probing and Interval
Between Retry Probes parameters for each operating system.
Note
In enterprise environments that require the restriction of unattended firewall ports for
security reasons, configure the storage node attributes mmds for disabled devices
and Dynamic nsrmmds unselected (static mode) to prevent a listener from starting
an inactive nsrmmd port. The EMC NetWorker Administration Guide provides more
information.
Note
The Software Configuration wizard requires one service port. The port is dynamic
and closes when the wizard closes. If you use the Software Configuration wizard,
add one additional port to the service port range.
The following table summarizes the port requirements specific to the Server
programs.
Note
Note
If you restrict unattended firewall for security reasons, then use the storage node
attributes mmds for disabled devices and Dynamic nsrmmds unselected (static
mode) to prevent a listener from starting on an inactive nsrmmd port.
In this example, only the local users can update the attributes in the NSR
system port ranges resource:
For example, if you connect to the NMC server with the NMC administrator
from the NMC client mnd.mydomain.com, type:
update administrator: *@localhost,
[email protected]
Enabling updates of the NSR system port ranges resource describes how to
provide user accounts with the ability to modify the service port attribute.
l If you see accounts in the Administrators attribute, then update the
Service ports attribute with the calculated service port range. For multiple
ranges, type one range per line.
4. In the Service ports attribute, specify the calculated service port range. For
multiple ranges, type one range per line.
Note
EMC recommends that you do not change the Connection ports attribute from
the default value 0-0.
5. Click Ok.
6. Stop and start the NetWorker services or daemons on the NetWorker host.
Option Description
-s target_hostname Optional. Use this option when updating the port range for a
remote NetWorker host. Enabling updates of the NSR system
port ranges resource describes how to enable remote access
of the NSR system port ranges resource.
-S range Sets the service port range to the value specified by range.
The default range is 7937-7941. If the range is not a
consecutive set of ports, use a space to separate the port
values.
For example, to modify the service port attribute in the NSR system port ranges
resource onmyclient.emc.com, perform the following steps:
Procedure
1. Display the current port range:
nsrports -s myclient.emc.com
2. Update the service port range. Separate multiple port ranges with a space. For
example:
Note
If you do not have permission to update the NSR system port ranges attribute,
an error message similar to the following appears: nsrexecd: User
'username' on machine 'hostname' is not on 'administrator'
list. Enabling updates of the NSR system port ranges resource describes how
to enable user access to update the NSR system port ranges resource.
nsrports -s myclient.emc.com
TCP
Note
2 ports in range
7939-9936
Port requirements
determined in
Service port requirements
for Snapshot clients
10000 (HTTP)
10024 (Persistence
Service)
Port requirements
determined in
Service port requirements
for Snapshot clients
Note
If you specified a
different port when you
configured the
NetWorker
Authentication Service,
specify that port number.
27001
Note
192.167.10.101 client_A
192.167.10.102 client_B
192.167.10.103 client_C
192.167.10.104 client_D
192.167.10.105 client_E
192.167.10.106 client_F
196.167.10.124 storage_node_X
192.167.10.125 storage_node_Y
192.167.10.127 storage_node_Z
192.167.10.126 NW_server
In this example:
l The Service port attribute on each client specifies a minimum of four service
ports, for example: 7937–7940.
Note
To simplify the configuration, configure each client to use the same four service
port numbers.
l The firewall must allow outbound traffic, to the IP address of each NetWorker
Client, on each of the service ports that are defined in the Service port attribute
on the NetWorker Client. Because each client can specify the same port numbers,
the firewall only needs to allow four ports for each client IP address. These port
numbers can be a subset of the port numbers that are used by the NetWorker
Server, as in this example.
l In pseudo syntax, the firewall rule for the service ports would look like this:
TCP, Service, src 192.167.10.*, dest 192.167.10.101, ports
7937-7940, action accept
TCP, Service, src 192.167.10.*, dest 192.167.10.102, ports
7937-7940, action accept
TCP, Service, src 192.167.10.*, dest 192.167.10.103, ports
7937-7940, action accept
...
In pseudo syntax, the firewall rule for the service ports would look like this:
TCP, Service, src 192.167.10.*, dest 192.167.10.*, ports
7937-7958, action accept
This example requires you to only open service ports for the NetWorker Server on the
firewall to allow inbound traffic. Calculate the service port requirements for the
NetWorker Server with this formula:
l The Service port attribute on each client specifies a minimum of four service
ports, for example: 7937–7940.
Note
To simplify the configuration, configure each client to use the same four service
port numbers.
l The firewall must allow outbound traffic, to the IP address of each NetWorker
Client, on each of the service ports that are defined in the Service port attribute
on the NetWorker Client. Because each client can specify the same port numbers,
the firewall only needs to allow four ports for each client IP address. These port
numbers can be a subset of the port numbers that are used by the NetWorker
Server, as in this example.
l In pseudo syntax, the firewall rule for the service ports would look like this:
TCP, Service, src 192.167.10.*, dest 192.167.10.101, ports
7937-7940, action accept
TCP, Service, src 192.167.10.*, dest 192.167.10.102, ports
7937-7940, action accept
TCP, Service, src 192.167.10.*, dest 192.167.10.103, ports
7937-7940, action accept
...
In the previous pseudo syntax, the firewall configuration allows:
This example requires you to only open service ports for the NetWorker Server on the
firewall to allow inbound traffic. Calculate the service port requirements for the
NetWorker Server with this formula:
14 +(num devices)+(num libraries) + 1 (client push)= 14 + 6 + 1 +1 = 22
In this example:
l The Service ports attribute of the NetWorker Server contains the range:
7937-7958.
l The firewall must allow inbound traffic to the IP address of the NetWorker Server
on each service port with the exception of the UDP port. In this example, 22 ports
in the range of 7937 to 7958 must allow inbound traffic to the NetWorker server.
l In pseudo syntax, the firewall rule for the service ports would look like the
following:
TCP, Service, src 192.167.10.*, dest 192.167.10.126, ports
7937-7958, action accept
Calculating service ports in a bi-directional firewall environment with Data
Domain
This example shows how to apply the basic rules to a sample network with clients A, B
and C, one storage node X, and a Data Domain appliance in an insecure network,
which uses Data Domain Cloud Tier devices. The NetWorker server and NMC server
are in a secure network. A single firewall separates the secure network from the
insecure network. The NetWorker server has a tape library and six drives. The client
sends backup data to the Data Domain appliance and each client acts as an NMC
client.
Figure 15 Bi-directional firewall with Data Domain appliance
Note
To simplify the configuration, configure each client to use the same four service
port numbers.
l The firewall must allow outbound traffic, to the IP address of each NetWorker
client, on the four service ports that are defined in the Service port attribute of
the NetWorker client. These port numbers can be a subset of the port numbers
that the NetWorker server uses.
l In pseudo syntax, the firewall rules for the service ports would look like the
following:
TCP, Service, src 192.167.10.*, dest 192.167.10.101, ports
7937-7940, action accept
TCP, Service, src 192.167.10.*, dest 192.167.10.102, ports
7937-7940, action accept
TCP, Service, src 192.167.10.*, dest 192.167.10.103, ports
7937-7940, action accept
Troubleshooting
This section contains solutions to some common problems encountered when you
configure NetWorker in a firewalled environment.
Backups appear to stop responding or slow down dramatically
When you configure a firewall to drop packets outside an allowed range, but the
firewall configuration does not allow for proper NetWorker connectivity:
l NetWorker will not get proper notification that a connection is not possible.
l The socket connections might not close correctly and remain in a TCP FIN_WAIT
state. As a result, NetWorker requires more ports for client connectivity.
To avoid these issues, configure the firewall to reject packets outside the allowed
range. When the firewall rejects packets, NetWorker receives an immediate
notification of any connection failures and the remaining operations continue.
If you cannot configure the firewall to reject packets, reduce the TCP timeout values
on the NetWorker server’s operating system to reduce the impact of the problem. The
Note
Connection refused
This message appears when the NetWorker host cannot establish a portmapper
connection on port 7938.
To resolve this issue, ensure that the NetWorker software can register an RPC
portmapper connection on port 7938.
Connection reset by peer
This message appears when the connection between two NetWorker hosts closes
prematurely.
To resolve this issue, configure the datazone to send a keep alive signal between the
hosts at an interval that is shorter than the time out period defined on the firewall.
Special considerations for a firewall environment describes how to configure the TCP
keep alive signal.
Unable to obtain a client connection to nsrmmgd (version #) on host hostname
This message appears on a Windows host when the Windows firewall Allow list on the
NetWorker server does not contain the nsrmmgd process.
When this error message appears:
l A library that is configured on the NetWorker storage node will not enter “ready”
state.
l Multiple nsrlcpd processes are started on the storage node.
Troubleshooting 151
Communication Security Settings
To resolve this issue, ensure that the firewall is turned on, then add the nsrmmgd
process to the Allow list of the Windows firewall on the NetWorker server host.
nsrndmp_save: data connect:failed to establish connection
This message appears during an NDMP-DSA backup when a Windows NetWorker
server uses Windows firewall, but an inbound rule for port 10000 does not exist.
To resolve this issue, perform the following steps:
1. Log in to the NetWorker server as a Windows administrator.
2. In the Windows Firewall application, on the Advanced properties select Inbound
Rules > New Rule.
3. Select Program and then click Next.
4. Select This Program Path.
5. Click Browse. Select the binary nsrdsa_save.exe, and then click Next.
6. Select Allow the connection, and then click Next.
7. Leave the default Profiles selections enabled, and then click Next.
8. Provide a name for the rule and click Finish.
9. Edit the new rule.
10. On the Protocols and Ports tab, perform the following steps:
a. From the Protocol type drop-down, select TCP.
b. From the Local Port drop-down, select Specific Ports. Specify port number
10000.
c. Click OK.
Unable to execute savefs job on host hostname: Remote system error - No route
to host
This message appears during a scheduled backup when the NetWorker server can
reach the client but cannot contact the nsrexecd process to start the savefs process.
To resolve this issue, ensure that you configure the following:
l Any external firewall between the two hosts to allow communication on the
required service ports.
l A personal firewall on the client, for example, iptables on Linux, to allow
communication between the two hosts on the required service ports.
Modifying the port number of the NetWorker portmapper service
NetWorker contains a fully functional RPC portmapper service within the client
daemon nsrexecd. The service runs by default on port 7938, and is used almost
exclusively throughout NetWorker.
To modify the port number, perform the following steps:
1. Edit the services file on the NetWorker host. The services file is located in the
following directory:
l On UNIX and Linux — /etc/services
l On Windows—%WINDIR%\system32\drivers\etc\services
2. Add the following entries:
nsrrpc 7938/tcp lgtomapper #EMC NetWorker RPC
nsrrpc 7938/udp lgtomapper #EMC NetWorker RPC
Replace the port number with the desired port. Ensure that you choose a new port
that is not already in use.
To resolve this issue, ensure that the firewall rules allow communication between the
NMC server and NetWorker server on the port that you configured for the NetWorker
Authentication Service. The default port is 9090.
Troubleshooting 153
Communication Security Settings
This chapter describes the settings available to ensure the protection of the data
handled by NetWorker.
5. In the Users field, specify the list of users that have access to the AES pass
phrases in one of the following formats:
l user=username
l username@hostname
l hostname
l host=hostname
l user=username, host=hostname
Note
If you enter a hostname or host=hostname in the Users attribute, then any user
on the specified host can recover the files for the client. To enter a username
without specifying the host, enter user=username.
6. Click OK.
Results
Only users that you specify in the Users field can modify the Datazone pass phrase
attribute in the NSR resource.
4. Click OK.
Results
NetWorker generates the datazone encryption key that is based on the pass phrase.
To recover the data, you must know the datazone pass phrase that was in the
Datazone pass phrase attribute at the time of the backup.
Note
To recover the data, NetWorker will prompt you for the password that you defined for
the backup.
<< / >>
+aes: *
Results
The backup operation encrypts the backup data based on the value specified in the
Datazone pass phrase in the NSR resource, on the NetWorker server.
where pass_phrase is the pass phrase that is specified in the Datazone pass
phrase attribute of the NSR resource on the NetWorker server at the time of
the backup.
When you recover data that requires different pass phrases, use additional -p
pass_phrase options to specify each required pass phrase.
2. Confirm that the recover operation successfully recovers the data.
When you specify an incorrect pass phrase:
l NetWorker creates 0kb files but does not recover the data into the files.
l The recover output reports a message similar to the following:
Invalid decryption key specified
where:
l pass_phrase is the pass phrase that is specified in the Datazone pass
phrase attribute of the NSR resource on the NetWorker server at the time
of the backup. When you recover data that requires different pass phrases,
use additional -p pass_phrase options to specify each required pass
phrase.
l filesystem_object is the full path to the data that you want to recover.
Note
NetWorker clients running on Linux on PowerPC or s390 architectures do not utilize
FIPS compliant libraries.
In NetWorker on Linux, by default the FIPS mode is set to disabled. To enable FIPS
mode operation on NetWorker on Linux, create a file /nsr/debug/fipsenable, and
restart NetWorker services. On Windows, NetWorker always utilizes FIPS mode, and
you cannot switch to non-FIPS mode.
The disablement of FIPS mode does not change the encryption algorithms that are
used by NetWorker. The encryption algorithms are consistent between FIPS and non-
FIPS modes.
NetWorker Module for Databases and Applications (NMDA) for MySQL running on
Linux does not utilize FIPS compliant encryption libraries, and is not supported on
Linux client platforms where FIPS mode is enabled.
Data integrity
NetWorker enables you to verify the integrity of the backup data and the integrity of
the NetWorker server databases.
Note
Procedure
1. On the Administration window, click Media.
2. In the left navigation pane, select Media Pools.
3. On the Media Pools window, right-click the pool and select Properties.
4. On the Configuration tab, select Auto media verify.
5. Click OK.
Note
The Verify files feature is not available for NetWorker clients on UNIX.
Procedure
1. Connect to the NetWorker host as an administrator.
2. In the NetWorker User program, select Verify Files from the Operation menu.
3. Select the data that you want to verify.
4. From the View menu, select Required volumes.
The Required Volumes window appears with the list of volumes that contain
the data that you want to verify. Mount the volumes in devices.
5. Click Start.
The Verify Files status window appears and provides the progress and results
of the Data Verification process. The output displays data mismatch messages
to alert you to any detected data changes since the backup.
Results
Verification also determines if a hardware failure kept the NetWorker server from
completing a successful backup. The Verify files feature provides a way to test the
ability to recover data.
The following output provides an example where the Verify Files process verifies four
files, and reports that one file, recover_resource.txt has changed since the
backup:
Verify Files
Requesting 4 file(s), this may take a while...
Verify start time: 28/10/2013 3:46:36 PM
Requesting 1 recover session(s) from server.
91651:winworkr: Successfully established AFTD DFA session for
recovering save-set ID '4285011627'.
C:\data\mnd.raw
C:\data\pwd.txt
C:\data\lad.txt
32210:winworkr: DATA MISMATCH FOR C:\data\lad.txt.
C:\data\
Received 4 file(s) from NSR server `bu-iddnwserver'
Verify completion time: 28/10/2013 3:46:48 PM
Verifying the integrity of the NetWorker server media data and client file
indexes
NetWorker provides you with the ability to manually check the integrity and
consistency of the media database and client file index by using the nsrim and nsrck
commands.
Note
The nsrim -X process will also perform media database maintenance tasks.
NetWorker server media database and index data mangement provides more
information.
Verifying the integrity of the NetWorker server media data and client file indexes 163
Data Security Settings
Level Description
1 Validates the online file index header, merging a journal of
changes with the existing header.
Moves all save set record files and the corresponding key files
to the appropriate folder under the C:\Program Files
\EMC NetWorker\nsr\index\client_name\db6 folder
on Windows hosts or the /nsr/index/client_name/db6
directory on UNIX hosts.
2 Performs a level 1 check and checks the online file index for
new and cancelled saves.
Adds new saves to the client file index, and removes cancelled
saves.
The UNIX man page and the EMC NetWorker Command Reference Guide provides
detailed information about how to use the nsrck command and the available options.
Data erasure
During a backup operation, NetWorker stores data in save sets on physical or virtual
volumes. NetWorker stores information about the save sets in the media database and
client file indexes.
Based on user-defined policies, NetWorker automatically performs media database
and client file index management, which expires data on volumes and makes the data
eligible for erasure. You can also manually erase data and remove data from the media
database and client file indexes.
5. To track the status of the label operation, on the Operations tab, select
Monitoring.
6. When prompted to overwrite label, click OK.
3. On the General tab, select Enabled or Disabled for the Monitor RAP attribute.
4. Click OK.
Single data zone: The NetWorker server hosts the nsrlogd daemon
By default, the nsrlogd daemon runs on the NetWorker server.
In this configuration, the nsrlogd daemon receives security audit messages from:
l The gstd and nsrexecd processes on the NMC server.
l The nsrexecd process on each NetWorker client in the data zone.
l The daemons that run on the NetWorker server.
Advantages:
l The NetWorker server daemons generate the majority of the security audit
messages. In this configuration, the audit log messages are not sent over the
network and will not increase network traffic.
l Security audit messages from each NetWorker client are sent to the NetWorker
server. Additional network ports and routes to other networks are not required to
send security audit messages.
The following figure provides an example of this configuration.
Multiple data zones: The NMC server hosts the nsrlogd daemon
In this configuration, the nsrlogd daemon runs on the NMC server and the NMC server
manages multiple NetWorker data zones. The NMC server must be configured as a
client, on each NetWorker server.
Advantages:
l Centralized logging of the security audit messages. The security audit log for each
NetWorker server is stored on the NMC server.
Disadvantages:
l If the nsrlogd daemon is not accessible, either because the daemon fails or
because of a message routing difficulty, security related events are not recorded.
l The NetWorker server daemons generate the majority of the security audit
messages. In this scenario, the security audit log messages are sent over the
network and increase network traffic.
l Each NetWorker host in each datazone must have a route to the NMC server.
The following figure provides an example of this configuration.
Figure 17 The NMC server is the audit log server for multiple data zones
Figure 18 Each NetWorker server in a data zone is the audit log server
Security events
The security audit log feature detects and reports configuration changes that can
result in inappropriate access or damage to a NetWorker server. NetWorker logs
successful and unsuccessful attempts to create and delete security-related resources
and modifications of security-related resource attributes in the audit log file.
Resource database
The following table summarizes which resources and attributes the security audit log
monitors in the resource database (RAP).
Authentication method
Auditlog filepath
Auditlog hostname
Auditlog severity
Table 26 Security event resources and attributes - resource database (RAP) (continued)
Archive users
Backup command
Executable path
Password
Remote access
Remote user
Password
Encryption
Password
Password
Proxy
Username
Name
Users
Notifications Action
Mail Program
Users
Table 26 Security event resources and attributes - resource database (RAP) (continued)
Remote user
Name
Privileges
Users
Resource identifier
Resource Attribute
NSR log Administrator
Log path
Maximum size MB
Maximum versions
Name
Owner
Certificate
Name
NW instance ID
Peer hostname
Features
Name
Table 27 Security event resources and attributes - NetWorker client database (continued)
Resource Attribute
Product version
Connection ports
Service ports
NSRLA Administrator
Auth methods
Certificate
My hostname
Name
NW instance ID
private key
VSS writers
nsrd Permission denied, user 'username' on 'hostname' does not have 'privilege1'
or 'privilege2' to create configure this resource - resource_type
This message appears when a user attempts to create a security-related resource but
does not have the required privileges on the NetWorker server.
For example:
15/08/2014 9:11:43 AM 3 nsrd Permission denied, user 'debbie'
on 'bu-iddnwserver.iddlab.local' does not have 'Create
Application Settings' or 'Configure NetWorker' privilege to
create this resource -
NSR client.
nsrd Permission denied, user 'username' on host: 'hostname' does not have
privilege1' or 'privilege2 privilege to configure this resource - resource_type
This message appears when a user attempts to modify a security-related attribute in a
resource but does not have the required privileges.
For example:
15/08/2014 9:03:45 AM 3 nsrd Permission denied, user 'debbie'
on 'bu-iddnwserver.iddlab.local' does not have 'Configure
NetWorker' OR 'Change Application Settings' privilege to
configure this resource - NSR client.
gstd Console: User 'username' logged out of Console server on host 'hostname'
This message appears when a user closes the Console window and connection to the
Console server.
For example:
14/08/2014 4:36:21 PM 0 gstd Console: User 'administrator'
logged out of Console server on host 'bu-
iddnwserver.iddlab.local'
This changes the location of the security audit log file. The default location
is /nsr/logs on a UNIX Audit Log server and NetWorker_install_path
\nsr\logs on a Windows Audit Log server.
6. Optionally, change the maximum size of the security audit log in the auditlog
maximum file size (MB) attribute.
When the log file reaches the maximum size, NetWorker renames the security
audit log file for archival purposes and creates a new security audit log file.
The default value for the auditlog maximum file size (MB) attribute is 2 MB.
7. Optionally, change the maximum number of the audit log file versions that
NetWorker maintains, in the auditlog maximum file version attribute.
When the log file version reaches the maximum number, NetWorker removes
the oldest archived version of the security audit log file before creating the new
log file.
The default value for the auditlog maximum file version attribute is 0, which
means that NetWorker maintains all versions.
Type Description
Informational Information that may be useful, but does not require any specific action.
Warning A temporary problem that NetWorker software may resolve or prompt you to
resolve.
Critical Errors that you are required to resolve, to ensure successful NetWorker
operations.
Changes to the attribute apply to each client that generates security related
events. For example, if the security audit log severity attribute is Information, all
clients send messages with the Information severity level. The Information and
Notice level audit messages are very common. If the security audit log records
too much or too little detail, then adjust the severity level accordingly.
Note
This field also controls remote client security audit configuration. At the
information, notice and warning levels, nsrd broadcasts the security
configuration to all clients during startup. At other levels, when supported
clients request the security configuration from the NetWorker server as
needed, the nsrd daemon does not broadcast security configuration during
startup.
9. Optionally, use a third party logging service to send security audit log messages
to by using the auditlog rendered service attribute.
The following table describes the available options. Each options enables
NetWorker to write unrendered security audit log messages to the
NetWorker_server_sec_audit.raw file only. Use the nsr_render_log
program to render the log file in to a readable format.
Option Description
None The default value.
syslog Also writes rendered security audit log messages to the UNIX
syslog.
10. Optionally, specify the locale for the rendered audit log file in the auditlog
rendered locale attribute. If this attribute is empty, the default locale en_US is
used. The Multi-locale datazone considerations section in the EMC NetWorker
Installation Guide describes how to install and configure the NetWorker software
on a machine that uses a non-English locale.
The following figure provides an example of the Security Audit Log Properties
resource.
Figure 19 Security Audit Log resource
12. Review the Monitoring > Log > window to ensure that the configuration
change completes successfully.
For example:
l If the host specified in the auditlog hostname attribute supports security
audit logging and the nsrlogd daemon is successfully started, a message
similar to the following appears:
The process nsrlogd was successfully configured on host
'security_audit_log_hostname' for server
'NetWorker_server'.
l If the host specified in the auditlog hostname attribute does not support
security audit logging or the nsrlogd daemon does not start successfully, a
message similar to the following appears:
The security audit log daemon nsrlogd is probably not
running. 'Unable to connect to the nsrexecd process on
host 'client_name'. '355:Program not registered'.'.
Ensure that the host 'client_name' can be reached. If
required, restart the host.
l If a service port is not available on the host that is specified in the auditlog
hostname attribute, the nsrlogd daemon fails to start and a message
similar to the following appears:
Process nsrlogd was spawned on
'security_audit_log_hostname', but nsrlogd could not
open an RPC channel. 'Unable to connect to the nsrlogd
process on host 'security_audit_log_hostname'.
'352:Remote system error'
l If the path specified in the auditlog filepath attribute does not exist, a
message similar to the following appears:
Unable to open the output file '/proc/
NetWorker_server_sec_audit.raw' for the security audit
log. No such file or directory
Note
Users that belong to the Security Administrators User Group, but not the
Application Administrators User Group cannot see messages in the Logs
window.