Docu53913 - Networker8.2 Administration Guide
Docu53913 - Networker8.2 Administration Guide
Version 8.2
Configuration Guide
302-000-703
03
Copyright © 2014 EMC Corporation. All rights reserved. Published in USA.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with
respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a
particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable
software license.
EMC², EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other
countries. All other trademarks used herein are the property of their respective owners.
For the most up-to-date regulatory document for your product line, go to EMC Online Support (https://support.emc.com).
EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com
Figures 5
Tables 7
Preface 9
Chapter 1 Introduction 13
Index 141
1 Revision history............................................................................................................... 9
2 Authority configuration parameters ...............................................................................22
3 Hierarchy errors in the Configure Login Authentication wizard ....................................... 32
4 NMC user roles and associated privileges...................................................................... 38
5 Operations allowed for each NetWorker privilege .......................................................... 41
6 Privileges associated with each NetWorker User Group.................................................. 45
7 NetWorker log files........................................................................................................ 72
8 Raw log file attributes that manage log file size..............................................................80
9 Raw log file attributes that manage the log file trimming mechanism............................. 80
10 Setting TCP parameters for each operating system.........................................................95
11 Standard NetWorker Client port requirements to NetWorker server.................................97
12 Additional service port requirements for Snapshot clients............................................. 98
13 Service port requirements for storage nodes ................................................................. 98
14 NetWorker server program port requirements.................................................................99
15 Port requirements to NMC server to each NetWorker client .......................................... 101
16 nsrports options.......................................................................................................... 103
17 Port requirements for NetWorker communications with third-party applications ..........104
18 NetWorker supported platforms that contain RSA BSAFE FIPS compliant encryption
technologies................................................................................................................121
19 Levels available for the nsrck process..........................................................................124
20 Security audit log interoperability matrix .....................................................................134
As part of an effort to improve its product lines, EMC periodically releases revisions of its
software and hardware. Therefore, some functions described in this document might not
be supported by all versions of the software or hardware currently in use. The product
release notes provide the most up-to-date information on product features.
Contact your EMC technical support professional if a product does not function properly
or does not function as described in this document.
Note
This document was accurate at publication time. Go to EMC Online Support (https://
support.emc.com) to ensure that you are using the latest version of this document.
Purpose
This document provides an overview of security settings available in the NetWorker
product.
Audience
This document is part of the EMC NetWorker documentation set, and is intended for use
by system administrators who are responsible for setting up and maintaining NetWorker
and managing a secure network.
Revision history
The following table presents the revision history of this document.
Table 1 Revision history
02 Aug 29, 2014 GA release of this document for EMC NetWorker 8.2.
Include new information about common audit log error
messages.
01 June 18, 2014 First release of this document for EMC NetWorker 8.2.
Related documentation
The following EMC publications provide additional information:
l NetWorker Online Software Compatibility Guide
Provides a list of client, server, and storage node operating systems supported by the
EMC information protection software versions. You can access the Online Software
Compatibility Guide on the EMC Online Support site at support.emc.com. From the
Support by Product pages, search for NetWorker using "Find a Product", and then
select the Install, License, and Configure link.
l EMC NetWorker Administration Guide
Describes how to configure and maintain the NetWorker software.
NOTICE
Note
Typographical conventions
EMC uses the following type style conventions in this document:
Bold Use for names of interface elements, such as names of windows, dialog
boxes, buttons, fields, tab names, key names, and menu paths (what
the user specifically selects or clicks)
® ®
EMC NetWorker is a heterogeneous backup application that addresses data protection
challenges. The centralized management capabilities of NetWorker provides effective
data protection for file systems, enterprise applications, storage arrays, and NAS filers to
a variety of target devices.
This guide provides an overview of security configuration settings available in NetWorker,
secure deployment, and physical security controls needed to ensure the secure operation
of the product.
This guide is divided into the following sections:
Access Control Settings
Access control settings enable the protection of resources against unauthorized
access. This chapter provides an overview of the settings available in the product to
ensure a secure operation of the product and describes how you can limit product
access by end-users or by external product components.
Log Settings
A log is a chronological record that helps you to examine the sequence of activities
surrounding or leading up to an operation, procedure, or event in a security-related
transaction from beginning to end. This chapter describes how to access and
manage the logs files available in NetWorker.
Introduction 13
Introduction
Access control settings enable the protection of resources against unauthorized access.
This chapter describes settings you can use to limit access by end-user or by external
product components.
l User authentication...............................................................................................16
l User authorization.................................................................................................38
l Component access control.................................................................................... 51
User authentication
User authentication settings control the processes that the NetWorker Management
Console (NMC) and the NetWorker software applications use to verify the identity claimed
by a user and to determine the level of access allowed to the user.
When you use a web browser on a host (NMC client) to connect to the NMC server, the
http daemon on the NMC server downloads the Java client to the NMC client. You do not
require a secure http (https) connection because only the Java client transfers
information and performs authentication between the NMC server and NMC client. The
NMC server uses SSL to encrypt the username and password that you specify in the login
window and authenticates the credentials. The first time an NMC client connects to the
NMC server, the NMC server uses Native NMC-based authentication to authenticate the
user credentials. After you connect to the NMC server for the first time, you can continue
to use the NMC-based authentication or you can configure access to the NMC server by
using an external authentication authority, such as LDAP or AD.
If the NetWorker server and the NMC server are on different hosts, then ensure that the
administrators list attribute on the NetWorker server includes the appropriate NMC user
accounts before you connect to a NetWorker server. Configuring the administrator list on
page 17 provides more information.
where:
l server_name is the name of the NMC server.
l http_service_port is the port for the embedded HTTP server. The default HTTP port is
9000.
For example: http://houston:9000
2. On the Welcome window, click Start.
3. On the Security Warning window, click Start to install and run NetWorker Console.
4. On the Licensing Agreement window, select Accept.
5. If you did not install the appropriate JRE version on the system, then a prompt to
install JRE appears. Follow the onscreen instructions to install JRE.
6. On the Welcome to the Console Configuration Wizard window, click Next.
7. On the Set Administrator password window, type the NMC password, and click Next.
8. On the Set Database Backup Server window, specify the name of the NetWorker
server that will backup the NMC server database, and then click Next.
9. On the Add NetWorker servers window, specify the names of the NetWorker server
that the NMC server will manage. When you specify more than one NetWorker server,
add one name per line. Leave the default options Capture Events and Gather
Reporting Data enabled.
l Enable the Capture Events option to allow the NMC server to monitor and record
alerts for events that occur on the NetWorker server.
l Enable the Gather Reporting Data option to allow the NMC server to automatically
collect data about the NetWorker server and generate reports. The NetWorker
Administration Guide on the EMC Online Support Site describes on how to run
reports and shows the reports that are available.
10.Click Finish.
Results
The Console window appears with a list of NetWorker servers.
NetWorker server are based on the entries present in the Users attribute of the User
Group resources, on the NetWorker server.
The NMC server controls how the NMC user accesses a managed NetWorker server. When
you enable the User Authentication for NetWorker system option on the NMC server, you
can grant and restrict NetWorker server access and privileges to individual NMC user
accounts. When you disable the User Authentication for NetWorker option, access
requests to a NetWorker server appear to come from the gstd process owner on the NMC
server. All NMC users that access the NetWorker server are granted the same access and
privilege rights that are assigned to the gstd process owner account. The NMC server
enables the User Authentication for NetWorker system option by default. When you
enable the option, the NMC server software creates a separate network connection from
the NMC server to a NetWorker server for each NMC user that has an Administration
window open to that server. Additional network connections might require access to
additional firewall service ports.
When you do not set the User Authentication for NetWorker system option, there is only
one network connection from the NMC server to the managed NetWorker server.
NetWorker supports the use Native NMC-based authentication or LDAP/AD authentication
to restrict or grant access to the NMC server and NetWorker servers.
Procedure
1. From the Console window, click Setup.
2. In the left pane, right-click Users, then select New.
The Create User dialog box appears.
3. Enter a username.
The username cannot:
l Exceed 64 characters.
l Use spaces, or any of these characters: : < > /
l Use characters with an ASCII value less than or equal to 32.
l Begin a username with an underscore (_) character.
4. Optionally, enter the full name of the user and a user description.
5. Select the Console user roles.
6. Enter the user password.
Ensure that you specify a password that meets the following requirements:
l Is a minimum of eight characters long
l Is not the same as the username
If you upgrade from a previous version of NetWorker that did not enforce these
password requirements, NetWorker will enforce these requirements when you attempt
to change the password.
7. In the Confirm Password attribute, re-enter the password.
8. Click OK.
5. Return to the Environment Variables window in the System applet and remove the
GST_RESET_PW environment variable.
This step prevents a password reset each time the EMC GST Service starts.
Resetting the administrator password for an NMC server on UNIX
Use the GST_RESET_PW environment variable to reset a lost or forgotten administrator
password to the default value.
Before you begin
Perform the following steps as the root user.
Procedure
1. Set GST_RESET_PW to a non-null value by using the appropriate command for the
shell.
For example, in ksh shell, type the following command:
4. Use a web browser to connect to the NMC server. When prompted, type
administrator in the username and password fields.
5. Set GST_RESET_PW back to null by using the appropriate command for the shell.
For example, in the ksh shell, type the following command:
export GST_RESET_PW=
This step prevents a password reset each time the EMC GST Service starts.
Note
LDAP Debug level Level of debug messages to log in Change this value to 1 for
the gstd.raw file. troubleshooting purposes only.
Server Certificate (LDAPS The full path to the CA certificate Required for LDAPS. When the
only) on the NMC server. NMC server and NetWorker
server are on different
platforms, use a forward slash
to specify the path.
For example: C:/Program
Files/EMC NetWorker/
Management/GST/cst/
corpldap/ca.cert
Client certificate (LDAPS The full path to the Client Required for LDAPS when the
only) certificate on the NMC server. LDAPS server requires a client
certificate.
When the NMC server and
NetWorker server are on
Client key (LDAPS only) The full path to the Client key on Required for LDAPS when the
the NMC server. LDAPS server requires a client
certificate.
When the NMC server is a
Windows host, use a double
backslash to specify the path.
For example: C:/Program
Files/EMC NetWorker/
Management/GST/cst/
corpldap/client.key
5. Click Next.
Troubleshooting authentication errors on page 31 describes common error
messages that might appear.
6. In the External Roles field, specify the LDAP or AD users and group to assign to the
NMC Console Security Administrator role.
7. Click Next.
If you specify a user or group that is not valid on the LDAP or AD server, then the
following message appears:
To resolve this issue, return to the Authority Configuration window, correct the value
in the Distinguished Name field and attempt to distribute the authority configuration
file again.
10.In the Monitor Distribution Progress window, review the progress of the configuration
file distribution. Ensure that the authority configuration file distribution succeeds for
all of the NetWorker servers.
11.Click Ok.
Logging in to the NMC server after LDAP or AD configuration
The next time you use an NMC client to connect to the NMC server, you must specify the
appropriate LDAP or AD user. If you cannot log in to the NMC server, then you can revert
back to Native NMC authentication mode and reconfigure AD/LDAP authentication.
The NetWorker Installation Guide provides more information.
Consider the following:
l When the wizard distributes the authority file, the process adds each LDAP and AD
authenticated NMC user that has the NMC Console Security Administrator role to the
Security Administrators User Group on each NetWorker server that the NMC server
has the privilege to manage.
Note
Members of the Security Administrators User Group have permissions to modify the
Audit Log server and User Group resources only. “Modifying User Group privileges on
page 46” describes how to add a manually created LDAP or AD user to a User Group
on a NetWorker server.
l When an LDAP or AD user logs in for the first time, the login process automatically
creates a NMC user account for the user.
l When an LDAP or AD user logs into the NMC server for the first time, the NMC server
automatically creates an NMC user account for the user and assigns the NMC user to
the same NMC role as the LDAP or AD group.
l LDAP and AD authentication does not support the use of the administrator user
name.
l The NMC server cannot perform LDAP and AD administrative functions. Perform LDAP
and AD administrative functions such as creating new domain users and groups with
the appropriate LDAP and AD tools.
l The External Roles field for the Security Administrator User Group is not populated
until an LDAP or AD user logs in for the first time.
l Troubleshooting login errors on page 35 provides detailed information to
troubleshoot common login error messages.
Example: Configuring an LDAP authority
In this example, a third party LDAP management tool, LDAPAdmin is used to view the
properties of the LDAP configuration.
The following figure provides an example of the values required to specify the following
attributes:
l Provider Server Name
l Distinguished Name
l User ID Attribute
l User Search Path — a combination of the AD Distinguished name and User Container
name.
l User Object Class
The following figure provides an example of the values associated with following LDAP
group attributes:
l Group Search Path — a combination of the Distinguished Name and Group Container
name.
l Group Member Attribute
l Group Object Class
Figure 2 LDAP Group Container
The following figure provides an example of the values associated with following AD
group attributes:
l Provider Service Name
l Group Container
l Group Member Attribute
l Group Object Class
l Group Search Path — a combination of the Distinguished Name and Group Container
name.
cannot validate the attribute value. The following table describes the messages that
appear and the attribute to correct.
...has a group name attribute ‘groupname’ ...in the Group Name Attribute field is not valid on
the LDAP or AD server.
...has a user id attribute ‘user_id’ ...in the User ID Attribute field is not valid on the
LDAP or AD server.
...belongs to object class ...in the Group Object Class field is not valid on the
‘group_object_class’ LDAP or AD server.
...has a group member attribute ...in the Group Member Attribute field is not valid
‘group_member_attribute’ on the LDAP or AD server.
l While distributing the authority configuration file to a new NetWorker server, the new
NetWorker server cannot authenticate the LDAP user account.
To resolve this issue, configure the NMC server to use Native NMC-based
authentication and then reconfigure the LDAP or AD authorities and distribute them
to all the required servers.
For example:
1. In the Distribute Authority Configuration File window, click Finish.
2. Start the Configure Login Authentication wizard again.
3. In the Select Authentication Method window, click Next.
4. Record the values in each attribute field for the configured LDAP or AD authorities;
click Back.
5. In the Select Authentication Method window, select Native NetWorker
Management Consoleand click Next.
6. Select all servers with a status Requires Update and click Distribute.
7. Click Finish.
8. Start the Configure Login Authentication wizard again and recreate the LDAP or AD
authority configuration.
l When an LDAP or AD user tries to modify the Server resource (NSR) on a NetWorker
server but the user is not a member of the Application Administrators or the Security
Administrators User Group.
To resolve this issue:
1. Close the NetWorker server and NMC server browser windows.
2. Log in to the NMC server with an LDAP or AD account that is a member of the
Application Administrators or the Security Administrators User Group.
Failed to retrieve authentication control attributes from NetWorker server
[NetWorker_server]
Appears when an LDAP or AD user that is not a member of the Security Administrators
User Group on the NetWorker server attempts to distribute the authority configuration file
to the NetWorker server.
To resolve this issue:
1. In the Distribute Authority Configuration File window, click Finish.
2. Close the NMC server browser window.
3. Log in to the NMC server with an LDAP or AD user that is a member of the Security
Administrators User Group on the NetWorker server. LDAP or AD users that have the
Console Security Administrator role on the NMC server are a member of the Security
Administrators User Group on the NetWorker server by default.
Note
Members of the Security Administrators User Group on a NetWorker server only have
permissions to modify the Security Audit Log server and User Group resources.
Modifying User Group privileges on page 46 describes how to modify the User
Group membership on a NetWorker server.
Could not validate external authority. Failed to get status of file (clientCertificate)
'full_path_to_client_certificate': No such file or directory. Provide valid path or copy the
certificates/key to the specified path
This message appears when the wizard attempts to distribute the authority configuration
file to the NetWorker server, but the paths that you specified to the certificate files are
incorrect.
To resolve this issue:
1. In the Distribute Authority Configuration File window, click Finish.
2. Start the Configure Login Authentication wizard again.
3. In the Select Authentication Method window, click Next.
4. Correct the pathnames in the certificate fields and retry the distribution.
Note
For Windows paths, use a forward slash (/) in the path. For example, c:/
my_ldap_server.
NSR Could not validate external authority LDAP bind failed because the server is down
This messages appears when there is an issue with the LDAPS certificate.
To troubleshoot LDAPS certificate issues, use the openssl program. By default, a
Windows host does not include the openssl program. http://www.openssl.org
describes how to obtain an openssl program from a third party provider.
1. Confirm that you can establish an SSL connection to the LDAPS server using the local
copy of the certificate files:
openssl s_client -connect ldaps_server_name:ssl_port -
CAfilefull_path_to_server_certificate -cert full_path_to_client_certificate -key
full_path_to_client_key_file
where:
l full_path_to_certificate is the full path to the Server Certificate file on the local
host. If the environment has a hierarchy of CA authorities, then specify the root CA
or the certificate file that contains all CA authority certificates.
l full_path_to_client_certificate_file specifies the full path to the Client Certificate file
on the local host. This option is only required when LDAPS requires a client
certificate.
l full_path_to_client_key_file specifies the full path to the Client Certificate file on
the local host. This option is only required when LDAPS requires a client key.
In another example, the LDAPS server, myldaps.emc.com requires a CA certificate
only. The certificate file, ca.cert, resides in the cst directory of a NMC server on
Windows. In this example, type the following command:
Note
For example: The LDAPS server, myldaps.emc.com requires a Client Certificate and a
Client Key. The certificate files and the key file resides in the cst directory of a NMC
server on Windows. In this example, type the following command:
Note
2. If the connection does not succeed, contact the LDAPS administrator to request new
copies of the certificate files. To manually copy the CA certificate file from the LDAP
server, perform the following steps:
a. Connect to the LDAPS server to display the Server Certificate (ca.cert) file:
Note
The openssl command may display two certificates. The second certificate is
usually the CA certificate.
b. Ensure that the certificate you receive matches the CA certificate on the LDAPS
server.
To resolve this issue, log in to the NMC server with a different LDAP or AD username.
Note
Members of the Security Administrators group have permission to modify the Security
Audit Log server and User Group resources only. Modifying User Group privileges on
page 46 describes how to add a manually created LDAP or AD user to a User Group
on a NetWorker server.
Procedure
1. On the Console window, click Setup.
2. In the left pane, right-click Users, then select New.
3. In the User Name attribute, enter the LDAP or AD username.
4. Optionally, enter the full name of the LDAP or AD user and a general description in the
remaining attributes.
5. Click OK.
The following image provides an example of the Create User window.
Note
When you manually assign a user or group to the Console Security Administrator role,
the NMC server does not automatically assign the user to the Security Administrators
User Group on the managed NetWorker servers. Modifying User Group privileges on
page 46 describes how to add a manually created LDAP or AD user to a User Group
on a NetWorker server.
5. Click OK.
User authorization
User authorization settings control rights or permissions that are granted to a user and
enable access to a resource managed by NetWorker.
Console User All tasks except for those tasks explicitly mentioned for the Console
Security Administrator and the Console Application Administrator.
Tasks include:
l Add and delete hosts and folders.
l Add and delete Managed applications for NetWorker, Data Domain,
and Avamar.
l Create and delete their own reports.
l Set features for Managed Applications.
l Manage a NetWorker server with the appropriate privilege levels.
l Dismiss events.
By default the NMC server adds users who are members of the Console Security
Administrators to the preconfigured Security Administrators user group on each
NetWorker server that the Console server manages. Members of the Security
Administrators user group only have privileges to modify the Security Audit Log server
and User Groups resources that the Console server can manage. User Group privileges on
page 41 summarizes the privileges assigned to users in each User Group.
Server authorization
The NetWorker server provides a mechanism to authorize users that perform operations
from a command prompt and from the NMC GUI.
Server authorization 39
Access Control Settings
l user=username , host=hostname
l group=groupname, host=hostname
5. Click OK.
Note
The Change Security Settings privilege requires that you also set the following
prerequisite privileges: View Security Settings, Create Security Settings, and
Delete Security Settings.
The Create Security Settings privilege requires that you also set the following
prerequisite privileges: View Security Settings, Change Security Settings, and
Delete Security Settings.
Delete Security The ability to delete user created user groups. Preconfigured user groups cannot
Settings be deleted.
Server authorization 41
Access Control Settings
Note
The Delete Security Settings privilege requires that you also set the following
prerequisite privileges: View Security Settings, Change Security Settings, and
Delete Security Settings.
Note
The Remote Access All Clients privilege requires that you also set the following
prerequisite privileges: Operate NetWorker, Monitor NetWorker, Operate
Devices and Jukeboxes, Backup Local Data, and Recover Local Data.
Configure The ability to configure resources associated with the NetWorker server, storage
NetWorker nodes, and clients. This includes creating, editing, and deleting resources.
Users with this privilege cannot configure User Group resources.
Note
The Configure NetWorker privilege requires that you also set the following
prerequisite privileges: Operate NetWorker, Monitor NetWorker, Operate
Devices and Jukeboxes, Backup Local Data, and Recover Local Data.
Operate The ability to perform NetWorker operations. For example, members can:
NetWorker
l Reclaim space in a client file index.
l Set a volume location or mode.
l Start or stop a savegroup.
l Query the media database and client file indexes.
Note
The Operate NetWorker privilege requires that you also set the following
prerequisite privileges: Monitor NetWorker, Operate Devices and Jukeboxes,
Backup Local Data, and Recover Local Data.
Operate The ability to perform device and autochanger operations, for example,
Devices and mounting, unmounting, and labeling. Users with this privilege can also view
Jukeboxes device status and pending messages, as well as view information in the media
database.
The Operate Devices and Jukebox privilege requires that you also set the
Monitor NetWorker privilege.
View The ability to view NetWorker resources including: Archive Requests, Client
Application resources, Device resources, Directives, Group, Jukebox, Label, License,
Settings Notification, Policies, Pool, Schedule, Staging, and Storage Node.
The View Application Settings privilege:
l Allows user group members to view the status of operations.
l Does not allow user group members to view the Server, User groups, or
Security Audit Log resources.
Server authorization 43
Access Control Settings
Note
The View Application Settings privilege requires that you also set the following
prerequisite privileges: Change Application Settings, Create Application
Settings, and Delete Application Settings.
Change The ability to change NetWorker resources including: Archive Requests, Client
Application resources, Device resources, Directives, Group, Jukebox, Label, License,
Settings Notification, Policies, Pool, Schedule, Staging, and Storage Node.
The Change Application Settings privilege:
l Allows user group members to view the status of operations.
l Does not allow user group members to change the Server, User groups, or
Security Audit Log resources.
Note
The Change Application Settings privilege requires that you also set the
following prerequisite privileges: Change Application Settings, Create
Application Settings, and Delete Application Settings.
Create The ability to create NetWorker resources including: Archive Requests, Client
Application resources, Device resources, Directives, Group, Jukebox, Label, License,
Settings Notification, Policies, Pool, Schedule, Staging, and Storage Node.
The Create Application Settings privilege:
l Allows user group members to view the status of operations.
l Does not allow user group members to change the Server, User groups, or
Security Audit Log resources.
Note
The Create Application Settings privilege requires that you also set the following
prerequisite privileges: Change Application Settings, Create Application
Settings, and Delete Application Settings.
Delete The ability to delete NetWorker resources including: Archive Requests, Client
Application resources, Device resources, Directives, Group, Jukebox, Label, License,
Settings Notification, Policies, Pool, Schedule, Staging, and Storage Node.
The Delete Application Settings privilege:
l Allows user group members to view the status of operations.
l Does not allow user group members to change the Server, User groups, or
Security Audit Log resources.
Note
The Delete Application Settings privilege requires that you also set the following
prerequisite privileges: Change Application Settings, Create Application
Settings, and Delete Application Settings.
Recover Allows users to recover data for a back up performed on another machine.
Remote Data
Note
By default, NMC, LDAP and AD users that have the NMC Console Security Administrator
role are automatically added to a preconfigured Security Administrators user group on
each NetWorker server that they have the right to manage.
Server authorization 45
Access Control Settings
l Archive Data
Server authorization 47
Access Control Settings
Procedure
1. From the Administration window, click Configuration.
2. Click User Groups.
3. Right-click the user group to edit, then select Delete.
4. When prompted, click Yes to confirm the deletion.
Note
Note
When a user belongs to a large number of groups, the total number of characters for all of
the group names can exceed the buffer size that NetWorker users to store the group
names. NetWorker excludes characters and group names that exceed the buffer size. If
you add a group to the External roles field or the Users file that is not in the buffer for a
userid, NetWorker will not consider the user to be a member of the User Group.
Note
EMC recommends that you specify usernames when your user accounts are a member
of a large number of groups.
user=patrick,host=jupiter
Note
The formats user@host, host and user, and similar formats are ambiguous as to
whether host or domain is intended. EMC recommends that you use the name=value
format.
user=operator,host=jupiter
user=operator,host=mars
&netadmins
Server authorization 49
Access Control Settings
Note
EMC recommends that you specify usernames when your user accounts are a member
of a large number of groups.
Note
When you configure LDAP/AD authentication by using the Configure Login Authentication
wizard, specify the userid that is a member of a large number of groups in the External
Roles field.
Component authentication
NetWorker hosts and daemons use the nsrauth mechanism to authenticate components
and users, and to prevent user and host impersonation. The nsrauth authentication
mechanism is a strong authentication that is based on the Secure Sockets Layer (SSL)
protocol. For Windows and most UNIX hosts, nsrauth uses the SSL protocol provided by
RSA BSAFE SSL. For some UNIX hosts, such as Darwin, HP-UX, Linux ppc64, Linux390,
nsrauth uses the SSL protocol provided by the OpenSSL library.
The nsrexecd service on each NetWorker host provides the component authentication
services. The first time the nsrexecd process starts on a host, the process creates the
following unique credentials for the host:
l 1024-bit RSA private key
l Self-signed certificate or public key
l NW Instance ID
l my hostname
NetWorker stores these credentials in the NSRLA resource found in the local NetWorker
client database, nsrexec. These credentials are known as local host authentication
credentials. NetWorker uses the local host authentication credentials to uniquely identify
the host, to other NetWorker hosts in the data zone.
When a NetWorker host communicates with other NetWorker hosts, the nsrauth process
creates an NSR Peer Information resource in the nsrexec database of the target host that
contains local host authentication credentials for the initiating host. When a NetWorker
host initiates a session connection to another host, the following steps occur:
1. The nsrexecd daemon on the initiating host contacts the nsrexecd daemon on
the target host.
2. The nsrexecd daemon on the initiating host sends the local host authentication
credentials to the target host.
3. The target host compares the local host authentication credentials with the
information stored in the local NSR Peer Information resource.
l If the information provided by the initiating host matches the information stored
in the NSR Peer Information resource on the remote host, then the nsrexecd
daemon creates a session key and establishes an SSL connection between the
two hosts. NetWorker uses AES-128 bit encryption to encrypt the data exchanged
between the two hosts.
l If the information provided by the initiating host does not match the information
stored in the NSR Peer Information resource on the remote host, then the remote
host requests the certificate from the initiating host.
n If the certificate provided by the initiated host matches the certificate stored
on the remote host, then the nsrexecd daemon creates a session key and
establishes an SSL connection between the two hosts. NetWorker uses
AES-128 bit encryption to encrypt the data exchanged between the two hosts.
n If the certificate provided by the initiating host does not match the certificate
stored on the remote host, NetWorker drops the connection between the two
hosts.
l If the remote host does not contain an NSR Peer Information resource for the
initiating host, the remote host uses the information provided by the initiating
host to create a new NSR Peer Information resource. NetWorker uses the session
key to establish an SSL connection between the two host. Component
authentication uses the AES-128 bit encryption method.
Note
nsradmin -p nsrexec
2. Set the query to the NSRLA resource:
. type: NSRLA
3. Display the NSRLA resource and view the current settings for the administrator
attribute:
print
4. Update the value of the administrator attribute to include the owner of the gstd
process on the NMC server:
append administrator:"user=gstd_owner,host=NMC_host"
where:
l gstd_owner is the user account that starts the gstd daemon on UNIX or the EMC
GST service on Windows. By default, the process owner is the SYSTEM user on
Windows and is the root user on UNIX.
l NMC host is the hostname of the NMC server.
For example, to add the SYSTEM account on a Windows NMC server named
win.emc.com to a UNIX NetWorker client named unix.emc.com, type:
IP_Address[mask], authentication_method[/authentication_method]...
where:
l IP_Address[mask] is an single IP address, a single host name, or an IP address and
netmask range. You can specify the number of bits for the mask value or use the
full subnet mask address.
l authentication_method is nsrauth, for strong authentication or oldauth for legacy
authentication.
Note
When you specify more than one authentication method, NetWorker attempts to
communicate with the first method in the list. If the first method fails, then
NetWorker will attempt to communicate by using the second method in the list.
For example:
l To configure host mnd.emc.com to only use nsrauth when communicating with the
host, type:
mnd.emc.com,nsrauth
Component authentication 53
Access Control Settings
l To configure all hosts on the 137.69.168.0 subnet to only use nsrauth when
communicating with the host, type:
137.69.160.0/24, nsrauth
l To configure all hosts in the data zone to use nsrauth when communicating with
the host except for a host with the IP address 137.69.160.10, which should try
oldauth first, type the following two lines:
137.69.160.10, oldauth/nsrauth
0.0.0.0, nsrauth
Note
When you specify more than one authentication method, NetWorker attempts to
communicate with the first method in the list. If the first method fails, then
NetWorker will attempt to communicate by using the second method in the list.
5. Click OK.
6. Restart the NetWorker services or daemons on the target host.
nsradmin -p nsrexec
2. Set the query type to the NSR Peer Information resource:
print
4. Update the auth methods attribute, by using the following format:
Where:
l IP_Address[mask] is an single IP address, a single host name, or an IP address and
netmask range. You can specify the number of bits for the mask value or use the
full subnet mask address.
l authentication_method is nsrauth, for strong authentication or oldauth for legacy
authentication.
Note
When you specify more than one authentication method, NetWorker attempts to
communicate with the first method in the list. If the first method fails, then
NetWorker will attempt to communicate by using the second method in the list.
For example:
l To configure host mnd.emc.com to only use the nsrauth when communicating with
the host, type:
Component authentication 55
Access Control Settings
For Windows paths, use a forward slash (/) when you specify the path. For example,
when the mnd_credentials.txt file is in c:\users, specify: c:/users/
mnd_credentials.txt.
6. Click OK.
Results
NetWorker exports the local host credential information to the file you specify, on the
target host.
Note
If you do not specify a path to the file, NetWorker creates the export file in the C:
\Windows\system32 directory on a Windows host and in the /nsr/cores/
nsrexecd directory on a UNIX host.
nsradmin -p nsrexec
2. Set the query type to NSRLA:
. type: NSRLA
3. Configure the NW instance info operations attribute and the NW instance info file
attribute to export the resource information:
For Windows paths, use a forward slash (/) when you specify the path.
For example, when the mnd_credentials.txt file is in c:\users, specify: c:/
users/mnd_credentials.txt.
Results
NetWorker exports the local host credential information to the file you specify, on the
target host.
generation utility creates. You can import the new certificate and key information to the
NSRLA resource of the host and import the information into the NSR peer information
resource on each host within the enterprise.
Creating a custom certificate and private key
Use the nwinstcreate command to create a custom certificate and private key.
Perform the following steps from a command prompt on the host that will use the custom
certificate and private key. You can import the custom file into the NSRLA resource on the
local host or you can import the custom file into the NSR Peer Information resource for the
host, on other hosts in the data zone.
Procedure
1. Start the nwinstcreate program:
nwinstcreate -ix
2. On the Enter the file name to save NetWorker identify
information into prompt, specify the name of the file to save the custom
certificate and private key or accept the default file name and location.
3. On the Enter a unique NetWorker instance name to identify your
machine prompt, specify an instance name or accept the default value (hostname of
the machine).
NetWorker uses the specified value in the my hostname attribute by default.
4. On the Enter the NetWorker instance id prompt, specify a unique value to
identify the host or accept the default value.
5. On the Enter the file containing the private key prompt, specify the
path and file name of a PEM formatted file that contains the private key for this host. If
your organization does not have a private key, leave the prompt blank and NetWorker
will generate the private key for the host.
6. On Windows hosts only, ensure that the Windows Local System Account (System) has
read, write, and modify privileges for the file that contains the custom certificate and
key.
Component authentication 57
Access Control Settings
nsradmin -p nsrexec
4. Set the query type to NSRLA:
. type: NSRLA
5. Configure the NW instance info operations attribute and the NW instance info file
attribute to import the resource information:
For Windows paths, use a forward slash (/) when you specify the path.For example,
when the mnd_credentials.txt file is in c:\users, specify: c:/users/
mnd_credentials.txt.
For example, when the mnd_credentials.txt file is in c:\users, specify: c:/
users/mnd_credentials.txt.
6. When prompted to update the resource, type Yes.
7. Exit the nsradmin program:
quit
Component authentication 59
Access Control Settings
5. On the Create certificate window, in the Change certificate drop-down menu, select
Load certificate from file.
6. In the Name attribute, enter the Name value from the credential file.
7. In the Instance ID attribute, enter the NW Instance ID value from the credential file.
8. In the Peer Hostname attribute, enter the My Hostname value from the credential file
9. In the Change certificate drop-down, select Load certificate from file.
10.In the Certificate file to load attribute, specify the path and name of the file that
contains the exported local host credentials.
For Windows paths, use a forward slash (/) when you specify the path. For example,
when the mnd_credentials.txt file is in c:\users, specify: c:/users/
mnd_credentials.txt.
11.On UNIX platforms, ensure that the root user has read and write permissions for the
credential file.
For example: chmod 600 export_file_name
12.Click OK.
Creating the NSR Peer Information by using nsradmin
Use the nsradmin program on a host to create and NSR Peer Information resource for a
host.
Before you begin
Connect to the target host with an account that has administrator access to the nsrexec
database. Configuring NetWorker client database access privileges on page 52 describes
how to update the administrator list in the NetWorker client database.
Procedure
1. Copy the file that contains the exported local host credentials to the target host.
2. Connect to the nsrexec database:
nsradmin -p nsrexecd
3. Create the NSR Peer Information resource:
where:
l hostname is value that appears in the Name attribute in the credential file.
l NW_instance_id is the value that appears in the NW Instance ID attribute in the
credential file.
l my_hostname is the value that appears in the My hostname attribute in the
credential file.
4. When prompted to create the resource, type Yes.
5. Set the current query to the new NSR Peer Information resource:
For Windows paths, use a forward slash (/) when you specify the path.For example,
when the mnd_credentials.txt file is in c:\users, specify: c:/users/
mnd_credentials.txt.
7. When prompted to update the resource, type Yes.
8. Display the hidden properties:
option hidden
9. Display the new NSR Peer Information resource:
Note
You cannot use NMC to delete the NSR Peer Information resource for a NetWorker host
that does not have an existing client resource configured on the NetWorker server.
Procedure
1. On the Administration window, select Configuration.
2. In the left navigation pane, expand the NetWorker server, and then expand the Local
Hosts resource.
3. Select the NetWorker host with the NSR Peer Information resource that you want to
delete.
Note
The NetWorker host does not appear in the Local Hosts section when a client resource
does not exist on the NetWorker server.
The Certificate window displays a list of NSR Peer Information resources stored in the
nsrexec database on the host.
4. In the Certificate window, right-click the certificate that you want to delete and select
Delete.
5. When prompted to confirm the delete operation, select Yes.
If you receive the error, User username on machine hostname is not on
administrator list, you cannot modify the resource until you configure the
Component authentication 61
Access Control Settings
NSRLA access privileges on the target host. Configuring NSRLA access privileges on
page 52 provides more information.
Results
The target host creates a new NSR Peer Information resource for the initiating host the
next time that the initiating host attempts to establish a connection with the target host.
Deleting the NSR Peer Information resource by using nsradmin
Use the nsradmin command on the target host to delete the NSR Peer Information
resource for the initiating host.
Before you begin
Connect to the target host with an account that has administrator access to the nsrexec
database. Configuring NetWorker client database access privileges on page 52 describes
how to update the administrator list in the NetWorker client database.
Procedure
1. Connect to the nsrexec database:
nsradmin -p nsrexec
2. Set the query type to the NSR Peer Information resource of the initiating host:
show
4. Print the attributes for the NSR Peer Information resource and confirm that the name
and peer hostname attributes match the hostname of the initiating host:
print
5. Delete the NSR Peer Information resource:
delete
6. When prompted to confirm the delete operation, type y.
7. Quit the nsradmin program:
quit
Results
The target host creates a new NSR Peer Information resource for the initiating host the
next time that the initiating host attempts to establish a connection with the target host.
Resolving conflicts between the local host credentials and NSR Peer Information resource
After two NetWorker hosts successfully authenticate each other, the target host creates
an NSR Peer Information resource to store the local host credentials of the initiating host.
The Target host uses attributes stored in the NSR Peer Information resource to validate
connection requests from the target host. When unexpected data loss or corruption
occurs in the NSRLA resource of the initiating host, the nsrexecd process creates new
local host credentials. When a host with new local host credentials attempts to connect
another host, the target host rejects the connection request if an NSR Peer Information
resource exists for the initiating host because the credentials do not match the contents
of the NSR Peer Information resource.
When the local host credentials change for a host, all target hosts that have had a prior
connection with the host will reject a connection attempt. You can resolve this issue in
one of the following ways:
l Manually delete the NSR Peer Information resource for the initiating host in the
NetWorker client database of each target host.
Note
If the NetWorker server is the initiating host, you must delete the NSR Peer
Information resource on each host in the data zone.
l Import a backup copy of the local host credentials on the initiating host.
Note
You cannot use NMC to delete the NSR Peer Information resource for a NetWorker host
that does not have an existing client resource configured on the NetWorker server.
Procedure
1. On the Administration window, select Configuration.
2. In the left navigation pane, expand the NetWorker server, and then expand the Local
Hosts resource.
3. Select the NetWorker host with the NSR Peer Information resource that you want to
delete.
Note
The NetWorker host does not appear in the Local Hosts section when a client resource
does not exist on the NetWorker server.
The Certificate window displays a list of NSR Peer Information resources stored in the
nsrexec database on the host.
4. In the Certificate window, right-click the certificate that you want to delete and select
Delete.
Component authentication 63
Access Control Settings
nsradmin -p nsrexec
2. Set the query type to the NSR Peer Information resource of the initiating host:
show
4. Print the attributes for the NSR Peer Information resource and confirm that the name
and peer hostname attributes match the hostname of the initiating host:
print
5. Delete the NSR Peer Information resource:
delete
6. When prompted to confirm the delete operation, type y.
7. Quit the nsradmin program:
quit
Results
The target host creates a new NSR Peer Information resource for the initiating host the
next time that the initiating host attempts to establish a connection with the target host.
Importing local host credentials into the NSR Peer Information resource
Use the nsradmin program or the Local Host window in NMC to import the private key
and certificate into the NSR Peer Information resource for the initiating host, on the target
host.
The next time the initiating host attempts to connect to the target host, the nsrauth
authentication process uses the imported local host credentials to create a new NSR Peer
Information resource for the initiating host.
Importing local host credentials by using NMC
Use NMC to connect to the NetWorker server and import the certificate and private key
into the NSR Peer Information resource for a NetWorker host.
Before you begin
The gstd process owner must have permission to update the nsrexec database on the
target host. Configuring NetWorker client database access privileges on page 52 provides
more information.
Procedure
1. On the Administration window, select Configuration.
2. In the left navigation pane, expand the NetWorker server, and then expand the Local
Hosts resource.
3. Right-click the target host and select Configure Local Agent.
4. Select the NetWorker host with the NSR Peer Information resource that you want to
modify.
5. In the Certificate window, right-click the certificate that you want to delete and select
Properties.
6. On the Create certificate window, in the Change certificate drop-down, select Load
certificate from file.
7. In the Certificate file to load attribute, specify the path and name of the file that
contains the exported local host credentials.
If you receive the error, User username on machine hostname is not on
administrator list, you cannot modify the resource until you configure the
NSRLA access privileges on the target host. Configuring NSRLA access privileges on
page 52 provides more information.
8. Click OK.
Importing local host credentials by using nsradmin
Use nsradmin to import the certificate and private key into the NSR Peer Information
resource for a NetWorker host.
Before you begin
Connect to the target host with an account that has administrator access to the nsrexec
database. Configuring NetWorker client database access privileges on page 52 describes
how to update the administrator list in the NetWorker client database.
Procedure
1. Connect to the nsrexec database:
nsradmin -p nsrexec
2. Set the query type to the NSR Peer Information resource of the initiating host:
Component authentication 65
Access Control Settings
option hidden
4. Print the attributes for the NSR Peer Information resource and confirm that the name
and peer hostname attributes match the hostname of the initiating host:
print
5. Update the new NSR Peer Information resource to use the exported certificate:
For Windows paths, use a forward slash (/) when you specify the path.For example,
when the mnd_credentials.txt file is in c:\users, specify: c:/users/
mnd_credentials.txt.
6. When prompted to update the resource, type Yes.
7. Display the hidden properties:
option hidden
8. Display the new NSR Peer Information resource:
Results
NetWorker generates a new certificate for the NetWorker host. You must delete all
existing Peer Information resources for the host, on other NetWorker hosts. Deleting the
Peer information resource on page 61 describes how to delete the resource.
Component authorization
NetWorker provides you with the ability to restrict remote program executions or client-
tasking rights on a NetWorker host.
You can also:
l Define users that can access the data of a NetWorker host and recover the data to a
different NetWorker host.
l Restrict client-initiated backups to the NetWorker server.
l Configure the NetWorker server to prevent the start up of new save and recover
sessions.
Scheduled backup Add the long and shortname of the NetWorker server.
For a clustered NetWorker server, add the long and shortname of the
virtual NetWorker and all physical nodes.
Remote directed Add the long and shortname of the administering client to the server file
recovery on the destination client.
NDMP DSA backup Add the long and shortname of the NetWorker client that initiates the
backup.
The software installation process on Windows and Solaris allows you to specify a list of
hosts to add to the servers file. To change the servers file after the installation completes
or to specify hosts on operating systems that do not allow you to configure the file during
the installation process, use a text editor to edit the servers file. The servers file resides in
the following locations:
l On UNIX and Mac NetWorker hosts: /nsr/res
l On Windows NetWorker hosts:NetWorker_installation_path\res
When you add a NetWorker host to the server file, ensure that you perform the following
tasks:
l Specify both the short name and FQDN for the host.
l Specify one hostname on each line.
l Restart the nsrexecd service on the host, after you save the file.
Note
If the server file is empty or does not exist, then any NetWorker host has client-tasking
rights to the host.
Component authorization 67
Access Control Settings
On UNIX computers, you can start the nsrexecd daemon with the -s servername option
to assign client-tasking rights to a host. The use of the -s option to start the nsrexecd
daemon supersedes the use of the servers files to restrict client-tasking rights.
Note
If you enter a hostname or host=hostname in the Remote Access attribute, then any
user on the specified host can recover the files for the client. To enter a username
without specifying the host, enter user=username.
5. Click OK.
Component authorization 69
Access Control Settings
Procedure
1. From the Administration window, click Configuration.
2. In the left navigation pane, right-click the NetWorker server and select Properties.
3. On the Miscellaneous tab, clear Accept recover sessions.
This chapter describes how to access and manage the logs files available in NetWorker.
Log Settings 71
Log Settings
NetWorker server Log file name and location defined UNIX only, OS log file.
generated syslog by the system log configuration file.
Unlike previous versions of the
messages NetWorker software,
local0.notice and NetWorker 8.0 and later does
local0.alert not modify the syslog.conf
file to configure
local0.notice and
local0.alert. Vendor
specific documentation
describes how to configure
local0.notice and
local0.alert
NMC server log files AIX & Linux: /opt/lgtonmc/ Contains information related to
management/logs/gstd.raw NMC server operations and
management. Use the
Solaris: /opt/LGTOnmc/
nsr_render_log program
management/logs/gstd.raw
to view the contents of the log
Windows: C:\Program Files file.
\EMC NetWorker\Management
\logs\gstd.raw
NMC web server AIX & Linux: /opt/lgtonmc/ Contains messages for the
management/logs/ embedded database server on
web_output the NMC server.
Solaris: /opt/LGTOnmc/
management/logs/
web_output
NMC server database log AIX & Linux: /opt/lgtonmc/ Contains messages for the
files management/logs/db_output embedded Apache httpd web
server on the NMC server.
Solaris: /opt/LGTOnmc/
management/logs/
web_output
The EMC NetWorker Administration Guide describes how to configure log file notifications.
Procedure
l To render a raw file into a format similar to a .log file and redirect the output to a text
file, type: nsr_render_log -c -meapthy raw_filename 1>output_filename
2>&1
where:
n raw_filename is the name of the unrendered file. For example, daemon.raw
n output_filename is the name of the file to direct the output to.
n -c suppresses the category
n -m suppresses the message ID
n -e suppresses the error number
n -a suppresses the activity ID
n -p suppresses the process ID
n -t suppresses the thread ID
n -h suppresses the hostname
n -y suppresses the message severity
l To render a .raw file from a remote machine, type: nsr_render_log -c -meapthy
-R hostname raw_filename 1>output_filename 2>&1
where:
n hostname is the name of the host that contains the .raw file.
n raw_filename is the name of the unrendered file. For example, daemon.raw
n output_filename is the name of the file to direct the output to.
n -c suppresses the category
n -e suppresses the error number
n -m suppresses the message ID
n -p suppresses the process ID
n -a suppresses the activity ID
n -t suppresses the thread ID
n -h suppresses the hostname
n -y suppresses the message severity
l To render a .raw file and only view log file messages for a specific device, type:
nsr_render_log -c -meapthy -F devicename raw_filename
1>output_filename 2>&1
nsradmin -p nsrexec
2. Set the resource type to NSR log:
For example, on a Windows NMC server, output similar to the following appears:
nsradmin> print
type: NSR log;
administrator: Administrators,
"group=Administrators,host=bu-iddnwserver.iddlab.local";
owner: NMC Log File;
maximum size MB: 2;
maximum versions: 10;
runtime rendered log: ;
runtime rollover by size: Disabled;
runtime rollover by time: ;
name: gstd.raw;
log path: \
"C:\\Program Files\\EMC NetWorker\\Management\\GST\\logs\
\gstd.raw";
nsradmin> print
Table 8 Raw log file attributes that manage log file size
Attribute Information
Maximum size Defines the maximum size of the log files.
MB
Default: 2 MB
Runtime rollover When set, this attribute invokes an automatic hourly check of the log file size.
by size
When you configure the runtime rendered log attribute, NetWorker trims the
runtime rendered log file and the associated .raw file simultaneously.
Default: disabled
Runtime rollover When set, this attribute invokes an automatic trimming of the log file at the
by time defined time, regardless of the size. The format of the variable is HH:MM
(hour:minute).
When you configure the runtime rendered log attribute, NetWorker trims the
runtime rendered log file and the associated .raw file simultaneously.
Default: undefined
How the trimming mechanism trims the log files differs depending on the how you define
the log file size management attributes. The following table summarizes the trimming
behavior.
Table 9 Raw log file attributes that manage the log file trimming mechanism
Note
When you do not l NetWorker checks the log file size when the nsrexecd process starts
configure runtime on the computer.
rollover by time or
runtime rollover by
l When the log file size exceeds the size defined by the maximum size
size MB attribute, NetWorker renames the existing log file to
log_file_name_date_time.raw then creates a new empty log
file.
Table 9 Raw log file attributes that manage the log file trimming mechanism (continued)
Note
Managing raw log file size for the daemon.raw, networkr.raw, and gstd.raw files
To configure the NetWorker software to rollover the .raw file by time, perform the
following steps.
Procedure
1. Log in to the NetWorker host with root on UNIX or with administrator for Windows.
2. Use the nsradmin program to access the NSRLA database:
nsradmin -p nsrexec
3. Set the resource type to NSR log:
For example, on a Windows NMC server, output similar to the following appears:
nsradmin> print
type: NSR log;
administrator: Administrators,
"group=Administrators,host=bu-iddnwserver.iddlab.local";
owner: NMC Log File;
maximum size MB: 2;
maximum versions: 10;
runtime rendered log: ;
runtime rollover by size: Disabled;
runtime rollover by time: ;
name: gstd.raw;
log path: \
"C:\\Program Files\\EMC NetWorker\\Management\\GST\\logs\
\gstd.raw";
Managing raw log file size for the daemon.raw, networkr.raw, and gstd.raw files 81
Log Settings
nsradmin> print
Note
In NetWorker 8.0 and later, the Security Audit Log feature provides the NetWorker server
and the NMC server with the ability to log specific security audit events related to their
operations.
Procedure
1. From the Administration window, select Configuration.
2. From the View menu, select Diagnostic mode.
3. Right-click the NetWorker server name in the left navigation pane and select
Properties.
4. On the Setup tab, select the Disabled button for the Monitor RAP attribute.
2. Start the daemon from a command prompt and specify the debug level.
For example:
l To start the nsrexecd daemon in debug mode, type: nsrexecd -D9
1>filename 2>&1
l To start the nsrd daemon in debug mode, type: nsrd -D9 1>filename 2>&1
where filename is the name of the text file that NetWorker uses to store the debug
messages.
3. After you collect the necessary debug information, perform the following steps:
a. Stop the NetWorker processes by using the nsr_shutdown command.
b. Restart the processes by using the NetWorker startup script:
l On Solaris and Linux, type: /etc/init.d/networker start
l On HP-UX, type: /sbin/init.d/networker start
l On AIX, type: /etc/rc.nsr
problems related to NetWorker client functions, start the nsrexecd process in debug
mode.
Procedure
1. Open the Services applet, services.msc.
2. Stop the NetWorker Remote Exec service.
On a NetWorker server this also stops the NetWorker Backup and Recover service.
3. To put a nsrexecd process in debug mode:
a. Right-click the NetWorker Remote Exec service and select Properties.
b. In the Startup Parameters field, type -D x
where x is a number between 1 and 99.
c. Click the Start button.
4. To put the nsrd process in debug mode:
a. Right-click the NetWorker Backup and Recover service and select Properties.
b. In the Startup Parameters field, type -D x
where x is a number between 1 and 99.
c. Click the Start button.
Results
NetWorker stores the debug information in the daemon.raw file.
After you finish
After you capture the debug information, stop the NetWorker services, remove the -D
parameter, and then restart the services.
Note
If you do not see the PID for each process on the Process tab, navigate to View >
Select Columns, and then select PID (Process Identifier)
l On UNIX, use the ps command. For example, type ps -ef | grep nsr to get a
list of all of the NetWorker processes that start with nsr.
2. From a command prompt, type:
where:
l PID is the process id of the process.
l x is a number between 0 and 9.
Note
Results
NetWorker logs the process debug information in the daemon.raw file.
After you finish
To turn off debugging, type:
Note
The NetWorker Command Reference Guide provides detailed information about all of the
available backup options and how to use the save command.
Procedure
1. On the Administration window, click Recover.
2. On the Select the Recovery Options window, select Advanced Options.
l To modify a scheduled recover job, select the job in the Configured Recovers
section and then select Properties.
l To configure a new recover job, select New.
Note
3. On the Select Recovery Options window, in the Debug level attribute, select the
debug level.
4. Complete the remaining steps in the Recovery Wizard.
Results
NetWorker logs the debug recovery information to the recover log file.
b. Display the attributes for the Recover resource that you want to troubleshoot:
print name:
recover_resource_name
where:
l nw_server.emc.com is the name of the NetWorker server.
l mnd.emc.com is the name of the source NetWorker client.
3. Confirm that the nsrd process can schedule the recover job:
a. Update the Recover resource to start the recover job:
update: name: recover_resource_name;start time: now
where recover_resource_name is the name of the Recover resource.
b. Quit the nsradmin application
c. Confirm that the nsrtask process starts.
If the nsrtask process does not start, the review the daemon.raw file on the
NetWorker server for errors.
4. To confirm that the NetWorker server can run the recover command on the remote
host, type the following command on the NetWorker server:
nsrtask -D3 -t ‘NSR Recover’ recover_resource_name
where recover_resource_name is the name of the Recover resource.
5. When the nsrtask command completes, review the nsrtask output for errors.
6. To confirm that the Recovery UI sends the correct recovery arguments to the recover
process:
a. Open a command prompt on the destination client.
b. Run the recover command with the recover options that the Recover resource uses.
For example:
c. At the Recover prompt, specify the value in the recover stdin attribute. Do not
include the “ ,” or the ";" that appears with the recover stdin attribute.
If the recover command appears to hang, then review the daemon.raw file for
errors.
d. When the recover command completes, review the recover output for errors. If
the recover command fails, then review the values specified in the Recover
resource for errors.
7. Use the jobquery command to review the details of the Recover job. From a
command prompt on the NetWorker server, type: jobquery
8. From the jobquery prompt, perform one of the following steps:
l Set the query to the Recovery resource and display the results of all recovery jobs
for a Recovery resource:
Where jobid is the jobid of the Recover job that you want to review.
Note
Review the daemon.raw file on the NetWorker server to obtain the jobid for the
recovery operation.
where:
l x is a number between 1 and 99.
l file_sytem_objects is the name of the files or directory to recover.
l filename is the name of the file that stores the debug information.
Note
The NetWorker Command Reference Guide provides detailed information about all of the
available recovery options and how to use the recover command.
This chapter describes how to ensure NetWorker uses secure channels for
communication and how to configure NetWorker in a firewall environment.
Service ports
The TCP server processes that run on each NetWorker host use service ports to listen for
inbound connections. Service ports are also known as listener ports or destination ports.
NetWorker uses two types of service ports:
l Fixed ports—NetWorker uses two fixed ports: TCP/7937 and TCP/7938. You must
include these ports in the service port range of each NetWorker host. NetWorker uses
these ports to initiate connections.
l Variable ports—NetWorker dynamically opens ports. A NetWorker host can allocate
any port in the defined service port range and the NetWorker daemons select the
dynamic ports within that range randomly. The default range is 7937-9936 and you
can narrow or expand this range.
To increase security in the environment, reduce the variable ports range to specify only
the minimum number of service ports that the NetWorker software requires. The minimum
value depends on the installation type and the number of hosted NetWorker devices.
NetWorker stores the service port range for a host in the NSR Local Agent (NSRLA)
resource in the NetWorker client database (nsrexec).
Connection ports
NetWorker processes use connection ports to connect to a service. The NetWorker
software requires one connection port for any type of communication between the client,
storage node, and server. Connection ports are also known as communication ports,
source ports, or outbound ports.
NetWorker uses a default range, 0-0, to indicate that the NetWorker software allows the
operating system to select the port for TCP clients. The operating system reserves
connection ports for short-term use and reuses the ports as needed. The operating
system might allow you to configure the dynamic port range, for example, by using the
netsh program on Windows. NetWorker does not require modifications to this range and
EMC recommends that you use the default dynamic port range.
The use of the default port range does not cause security concerns. EMC recommends
that you do not change the range for any NetWorker hosts in the data zone. NetWorker
performance problems or random malfunctions can occur when the range is too narrow.
Note
If the firewall time out is shorter than the common one hour value, further decrease these
values. The network overhead as a result of enabling TCP KeepAlive is minimal.
The following table summarizes the Wait Time Before Probing and Interval
Between Retry Probes parameters for each operating system.
# no -o tcp_keepintvl = 6840
Solaris # ndd -set /dev/tcp Add the ndd commands to the /etc/
tcp_time_wait_interval rc2.d/S69inet file.
3420000
TCP/390435 Dynamic TCP port from the service port range nsrexecd/res_minor
TCP/390436 Dynamic TCP port from the service port range nsrexecd/gss_auth
TCP/390409 (Snapshot Dynamic TCP port from the service port nsrpsd/nsrsnapckd
services) range
TCP/390429 Dynamic TCP port from the service port range. nsrlcpd
TCP/390104 Dynamic TCP port from the service port range. Total nsrmmd
port number depends on device type.
Note
In enterprise environments that require the restriction of unattended firewall ports for
security reasons, configure the storage node attributes mmds for disabled devices and
Dynamic nsrmmds unselected (static mode) to prevent a listener from starting on an
inactive nsrmmd port. The NetWorker Administration Guide provides more information.
Note
The Software Configuration Wizard requires one service port. The port is dynamic and
closes when the wizard closes. If you use the Software Configuration Wizard, add one
additional port to the service port range.
The following table summarizes the port requirements specific to the Server programs.
Note
Note
If you restrict unattended firewall for security reasons, then use the storage node
attributes mmds for disabled devices and Dynamic nsrmmds unselected (static mode) to
prevent a listener from starting on an inactive nsrmmd port.
In this example, only the local users can update the attributes in the NSR system port
ranges resource:
For example, if you connect to the NMC server with the NMC administrator from the
NMC client mnd.mydomain.com, type:
then the account that you used to log in to the NMC server does not have
permission to modify the port ranges. Enabling updates of the NSR system port
ranges resource on page 101describes how to provide user accounts with the
ability to modify the service port attribute.
l If you see accounts in the Administrators attribute, then update the Service ports
attribute with the calculated service port range. For multiple ranges, type one
range per line.
4. In the Service ports attribute, specify the calculated service port range. For multiple
ranges, type one range per line.
Note
EMC recommends that you do not change the Connection ports attribute from the
default value 0-0.
5. Click Ok.
6. Stop and start the NetWorker services or daemons on the NetWorker host.
Option Description
-s target_hostname Optional. use this option when updating the port range for a remote
NetWorker host. Enabling updates of the NSR system port ranges resource on
page 101 describes how to enable remote access of the NSR system port
ranges resource.
-S range Sets the service port range to the value specified by range. The default range
is 7937-7941. If the range is not a consecutive set of ports, use a space to
separate the port values
-C range Sets the connection port range to the value specified by range. EMC
recommends that you do not change the connection ports attribute from the
default value 0-0.
For example, to modify the service port attribute in the NSR system port ranges resource
onmyclient.emc.com, perform the following steps:
Procedure
1. Display the current port range:
#nsrports -s myclient.emc.com
Note
If you do not have permission to update the NSR system port ranges attribute, an error
message similar to the following appears: nsrexecd: User 'username' on
machine 'hostname' is not on 'administrator' list. Enabling
updates of the NSR system port ranges resource on page 101 describes how to enable
user access to update the NSR system port ranges resource.
NetWorker client NetWorker Storage TCP Port range determined in NetWorker client
Node service port requirements on page 97
NetWorker client NMC server TCP Port range determined in NetWorker client
service port requirements on page 97
NetWorker storage NetWorker Client TCP Port range determined in NetWorker client
node service port requirements on page 97
NetWorker storage NetWorker Server TCP Port range determined in Service port
node requirements for NetWorker storage
nodes on page 98
NetWorker storage NetWorker Server TCP Port range determined in Service port
node (NDMP-DSA requirements for NetWorker storage
or SnapImage) nodes on page 98
NetWorker server NetWorker Client TCP Port range determined in NetWorker client
service port requirements on page 97
NetWorker server NetWorker Storage TCP Port range determined in Service port
Node UDP requirements for NetWorker server on page
99
Note
NetWorker server NMC Server TCP Port range determined in Service port
requirements for NMC server on page 100
NMC Server NetWorker server TCP Port range determined in Service port
requirements for NMC server on page 100
NMC Server NetWorker client TCP Port range determined in Service port
requirements for NMC server on page 100
NMC Server Data Domain TCP 161 (Port used by SNMPd to query the Data
TCP Domain system)
162 (Port used by SNMPtrapd to capture
Data Domain SNMP traps)
NMC Client NMC Server TCP 9000 (Port used by HTTPd to download the
Console user interface)
TCP
9001 (Port used to perform RPC for calls
from the Console Java client to the Console
UPD server)
2638 (Port used by Tabular Data Stream
(TDS) for database queries)
You can modify default ports values. How to
confirm NMC server service ports on page
107 provides more information.
Data Domain NMC Server TCP/UDP 162 (Port used by SNMPtrapd to capture
Data Domain SNMP traps)
Note
192.167.10.101 client_A
192.167.10.102 client_B
192.167.10.103 client_C
192.167.10.104 client_D
192.167.10.105 client_E
192.167.10.106 client_F
196.167.10.124 storage_node_X
192.167.10.125 storage_node_Y
192.167.10.127 storage_node_Z
192.167.10.126 NW_server
Calculating service ports for a uni-directional firewall environment with storage nodes
This example describes how to apply the basic rules of service port calculations to a
sample network. In this example there is one NetWorker Storage Node on either side of
the firewall. Clients D, E, and F in the secure network back up data to the storage node in
the secure network. Clients A, B, and C in the insecure network back up data to the
storage node in the insecure network. The firewall protects each host in the secure
network. The firewall does not protect hosts in the insecure network. The firewall blocks
network traffic from insecure to secure.
Figure 7 Uni-directional firewall with storage nodes
This example requires you to only open service ports for the NetWorker Server on the
firewall to allow inbound traffic. Calculate the service port requirements for the NetWorker
Server with this formula:
l The Service port attribute on each client specifies a minimum of four service ports, for
example: 7937–7940.
Note
To simplify the configuration, configure each client to use the same four service port
numbers.
l The firewall must allow outbound traffic, to the IP address of each NetWorker Client,
on each of the service ports defined in the Service port attribute on the NetWorker
Client. Because each client can specify the same port numbers, the firewall only
needs to allow four ports for each client IP address. These port numbers can be a
subset of the port numbers used by the NetWorker Server, as in this example.
l In pseudo syntax, the firewall rule for the service ports would look like this:
Calculating service ports for a uni-directional firewall environment with storage nodes
This example describes how to apply the basic rules of service port calculations to a
sample network. In this example there is one NetWorker Storage Node on either side of
the firewall. Clients D, E, and F in the secure network back up data to the storage node in
the secure network. Clients A, B, and C in the insecure network back up data to the
storage node in the insecure network. The firewall protects each host in the secure
network. The firewall does not protect hosts in the insecure network. The firewall blocks
network traffic from insecure to secure.
Figure 8 Uni-directional firewall with storage nodes
This example requires you to only open service ports for the NetWorker Server on the
firewall to allow inbound traffic. Calculate the service port requirements for the NetWorker
Server with this formula:
14 +(num devices)+(num libraries) + 1 (client push)= 14 + 6 + 1 +1 = 22
In this example:
l The Service ports attribute of the NetWorker Server contains the range: 7937-7958.
l The firewall must allow inbound traffic to the IP address of the NetWorker Server on
each service port with the exception of the UDP port. In this example, 22 ports in the
range of 7937 to 7958 must allow inbound traffic to the NetWorker server.
l In pseudo syntax, the firewall rule for the service ports would look like this:
In this example:
l Configure the Service port attribute on the NetWorker Server to use a minimum of 21
service ports, for example: 7937–7957.
l Configure the firewall to allow inbound traffic, to the IP address of the NetWorker
Server:
n On the 21 service ports specified in Service port attribute of the NetWorker Server.
The UDP port is not required.
n On TCP ports 2049 and 2052 for Data Domain connectivity.
n On TCP ports 111 and 161 for Data Domain connectivity.
In pseudo syntax, the firewall rules for the service ports would look like this:
Note
To simplify the configuration, configure each client to use the same four service port
numbers.
l The firewall must allow outbound traffic, to the IP address of each NetWorker client,
on the four service ports defined in the Service port attribute of the NetWorker client.
These port numbers can be a subset of the port numbers that the NetWorker server
uses.
l In pseudo syntax, the firewall rules for the service ports would look like this:
Troubleshooting
This section contains solutions to some common problems encountered when you
configure NetWorker in a firewalled environment.
Backups appear to stop responding or slow down dramatically
When you configure a firewall to drop packets outside an allowed range, but the firewall
configuration does not allow for proper NetWorker connectivity:
l NetWorker will not get proper notification that a connection is not possible.
l The socket connections might not close correctly and remain in a TCP FIN_WAIT state.
As a result, NetWorker will require more ports for client connectivity.
To avoid these issues, configure the firewall to reject packets outside the allowed range.
When the firewall rejects packets, NetWorker receives an immediate notification of any
connection failures and the remaining operations continue.
If you cannot configure the firewall to reject packets, reduce the TCP timeout values on
the NetWorker server’s operating system to reduce the impact of the problem. The
Performance Optimization and Planning Guide describes how to change TCP timeout
values.
Cannot bind socket to connection port range on system hostname
This message appears in the savegroup messages or in stdout during manual operations
when there are insufficient connection ports available and NetWorker cannot establish a
connection.
To resolve this issue, ensure that the Connection port attribute in the NSR System Port
ranges resource is 0-0 on the host specified by hostname.
Failed to bind socket for service_name service: Can't assign requested address
This messages appears when a NetWorker daemon cannot register to a port within the
service port range because all ports are in use by other daemons and process.
To resolve this issue, increase port range in the Service ports attribute in the NSR System
port ranges resource on the NetWorker host and make a corresponding change in the
firewall rules.
Service is using port port_number which is outside of configured ranges: range
This message appears in the Logs window when a NetWorker daemon attempts to
register to a port that is not within the service port range. This can occur because the port
requirements of the NetWorker host exceed the number of service ports defined in the
range.
To resolve this issue, increase port range in the Service ports attribute in the NSR System
port ranges resource on the NetWorker host and make a corresponding change in the
firewall rules.
Note
Communications between NetWorker processes on the same host do not follow defined
rules. For example, the NetWorker server daemons communicate internally outside of the
defined port range. Do not configure a firewall to limit the range for TCP traffic inside a
single system.
Connection refused
This message appears when the NetWorker host cannot establish a portmapper
connection on port 7938.
To resolve this issue, ensure that the NetWorker software can register an RPC portmapper
connection on port 7938.
Connection reset by peer
This message appears when the connection between two NetWorker hosts closes
prematurely.
To resolve this issue, configure the data zone to send a keep alive signal between the
hosts at an interval that is shorter than the time out period defined on the firewall.
Special considerations for a firewall environment on page 94 describes how to configure
the TCP keep alive signal.
Unable to obtain a client connection to nsrmmgd (version #) on host hostname
This message appears on a Windows host when the Windows firewall Allow list on the
NetWorker server does not contain the nsrmmgd process.
When this error message appears:
l A library configured on the NetWorker storage node will not enter “ready” state.
l Multiple nsrlcpd processes are started on the storage node.
To resolve this issue, ensure that the firewall is turned on, then add the nsrmmgd process
to the Allow list of the Windows firewall on the NetWorker server host.
nsrndmp_save: data connect:failed to establish connection
This message appears during an NDMP-DSA backup when a Windows NetWorker server
uses Windows firewall, but an inbound rule for port 10000 does not exist.
To resolve this issue, perform the following steps:
1. Log in to the NetWorker server as a Windows administrator.
2. In the Windows Firewall application, on the Advanced properties select Inbound
Rules > New Rule.
3. Select Program and then click Next.
4. Select This Program Path.
Troubleshooting 113
Communication Security Settings
5. Click Browse. Select the binary nsrdsa_save.exe, and then click Next.
6. Select Allow the connection, and then click Next.
7. Leave the default Profiles selections enabled, and then click Next.
8. Provide a name for the rule and click Finish.
9. Edit the new rule.
10. On the Protocols and Ports tab, perform the following steps:
a. From the Protocol type drop-down, select TCP.
b. From the Local Port drop-down, select Specific Ports. Specify port number 10000.
c. Click OK.
Unable to execute savefs job on host hostname: Remote system error - No route to host
This messages appears during a scheduled backup when the NetWorker server can reach
the client but cannot contact the nsrexecd process to start the savefs process.
To resolve this issue, ensure that you configure the following:
l Any external firewall between the two hosts to allow communication on the required
service ports.
l A personal firewall on the client, for example, iptables on Linux, to allow
communication between the two hosts on the required service ports.
This chapter describes the settings available to ensure the protection of the data handled
by NetWorker.
Note
If you enter a hostname or host=hostname in the Users attribute, then any user on
the specified host can recover the files for the client. To enter a username without
specifying the host, enter user=username.
5. Click OK.
Results
Only users that you specify in the Users field can modify the Datazone pass phrase
attribute in the NSR resource.
Note
To recover the data, NetWorker will prompt you for the password that you defined for the
backup.
<< / >>
+aes: *
3. Save the directive file.
4. Perform the backup by using the save command with the -foption.
save -f full_path_to_directive_file backup_object
For example, to backup the directory c:\data on a Windows host where you created
the nsr.dir file in the c:\directives folder, type the following command:
Procedure
1. Select Advanced Options.
2. In the Pass phrases attribute, specify the pass phrase(s) used at the time of the
backup .
Table 18 NetWorker supported platforms that contain RSA BSAFE FIPS compliant encryption
technologies
Windows Windows Server 2008 (all Windows Server 2008 Core SP1, SP2
x64 editions) SP1, SP2
Windows Server 2008 (all editions) SP1, SP2
Windows Server 2008 R2 (all
Windows Server 2008 R2 (all editions) SP1
editions) SP1
Windows 7 SP1
Windows VISTA [Business, Ultimate edition]
SP1, SP2
Linux x86 Red Hat Enterprise Linux AS, ES, Red Hat Enterprise Linux AS, ES, WS 5, 6
WS 5, 6
SuSE Linux Enterprise Server (SLES) 10, 11
SuSE Linux Enterprise Server
Oracle Linux 5
(SLES) 10, 11
Novell Open Enterprise Server (OES) OES, OES
Oracle Linux 5
SP2, OES 2, OES SP3
Novell Open Enterprise Server
Redflag Asianux Server 3
(OES) OES, OES SP2, OES 2, OES
SP3 CentOS Linux 5
Linux x64 Red Hat Enterprise Linux AS, ES, Red Hat Enterprise Linux AS, ES, WS 5, 6
WS 5, 6
SuSE Linux Enterprise Server (SLES) 10, 11
SuSE Linux Enterprise Server
Oracle Linux OES, OES SP2, OES 2, OES SP3
(SLES) 10, 11
Oracle Linux OES, OES SP2, OES
2, OES SP3
Table 18 NetWorker supported platforms that contain RSA BSAFE FIPS compliant encryption
technologies (continued)
Data integrity
NetWorker enables you to verify the integrity of the backup data and the integrity of the
NetWorker server databases.
Note
Procedure
1. In the NetWorker User program, select Verify Files from the Operation menu.
2. Select the data that you want to verify.
3. From the View menu, select Required volumes.
The Required Volumes window appears with the list of volumes that contain the data
that you want to verify. Mount the volumes in devices.
4. Click Start.
Results
The Verify Files status window appears and provides the progress and results of the Data
Verification process.
The following output provides an example where the Verify Files process verifies 3 files,
and reports that one file, recover_resource.txt has changed since the backup:
Verify Files
Requesting 4 file(s), this may take a while...
Verify start time: 28/10/2013 3:46:36 PM
Requesting 1 recover session(s) from server.
91651:winworkr: Successfully established AFTD DFA session for
recovering save-set ID '4285011627'.
C:\data\mnd.raw
C:\data\pwd.txt
C:\data\lad.txt
32210:winworkr: DATA MISMATCH FOR C:\data\lad.txt.
C:\data\
Received 4 file(s) from NSR server `bu-iddnwserver'
Verify completion time: 28/10/2013 3:46:48 PM
Verifying the integrity of the NetWorker server media data and client file indexes
NetWorker provides you with the ability to manually check the integrity and consistency
of the media database and client file index by using the nsrim and nsrck commands.
Note
The nsrim -X process will also perform media database maintenance tasks.
NetWorker server media database and index data maangement on page 125 provides
more information.
Level Description
1 Validates the online file index header, merging a journal of changes with the existing
header.
Moves all save set record files and the corresponding key files to the appropriate folder
under the C:\Program Files\EMC NetWorker\nsr\index\client_name\db6
folder on Windows hosts or the /nsr/index/client_name/db6 directory on UNIX
hosts.
2 Performs a level 1 check and checks the online file index for new and cancelled saves.
Adds new saves to the client file index, and removes cancelled saves.
3 Performs a level 2 check and reconciles the client file index with the media database.
Removes records that have no corresponding media save sets.
Removes all empty subdirectories under db6 directory.
4 Performs a level 3 check and checks the validity of the internal key files for a client file
index. Rebuilds any invalid key files.
5 Performs a level 4 check and verifies the digest of individual save times against the key
files.
Level Description
6 Performs a level 5 check and extracts each record from each save time, to verify that each
record can be extracted from the database. Re-computes the digest of each save time and
compares the results with the stored digest. Rebuilds internal key files.
The EMC NetWorker Command Reference Guide provides more information about how to
use the nsrck command and the available options.
Data erasure
During a backup operation, NetWorker stores data in save sets on physical or virtual
volumes. NetWorker stores information about the save sets in the media database and
client file indexes.
Based on user-defined policies, NetWorker automatically performs media database and
client file index management, which expires data on volumes and makes the data eligible
for erasure. You can also manually erase data and remove data from the media database
and client file indexes.
automatic volume relabeling for eligible volumes in a pool. The NetWorker Administration
Guide provides more information.
7. Click Yes.
l The NetWorker server daemons generate the majority of the security audit messages.
In this configuration, the audit log messages are not sent over the network and will
not increase network traffic.
l Security audit messages from each NetWorker client are sent to the NetWorker server.
Additional network ports and routes to other networks are not required to send
security audit messages.
The following figure provides and example of this configuration.
Figure 10 The audit log server manages a single data zone
Multiple data zones: The NMC server hosts the nsrlogd daemon
In this configuration, the nsrlogd daemon runs on the NMC server and the NMC server
manages multiple NetWorker data zones. The NMC server must be configured as a client,
on each NetWorker server.
Advantages:
l Centralized logging of the security audit messages. The security audit log for each
NetWorker server is stored on the NMC server.
Disadvantages:
l If the nsrlogd daemon is not accessible, either because the daemon fails or because
of a message routing difficulty, security related events are not recorded.
l The NetWorker server daemons generate the majority of the security audit messages.
In this scenario, the security audit log messages are sent over the network and will
increase network traffic.
l Each NetWorker host in each data zone must have a route to the NMC server.
The following figure provides an example of this configuration.
Figure 11 The NMC server is the audit log server for multiple data zones
Figure 12 Each NetWorker server in a data zone is the audit log server
Security events
The security audit log feature detects and reports configuration changes that can result in
inappropriate access or damage to a NetWorker host. NetWorker logs successful and
unsuccessful attempts to create and delete security-related resources and modifications
of security-related resource attributes in the audit log file.
Resource database
The following table summarizes which resources and attributes the security audit log
monitors in the resource database (RAP).
Notifications Action
NSR restricted data zone /Restricted Data Zone (RDZ) External roles
Privileges
Users
Resource Attribute
NSR log Administrator
Log path
Maximum size MB
Maximum versions
Name
Owner
Runtime rendered log
Runtime rollover by size
Runtime rollover by time
NSRLA Administrator
Auth methods
Certificate
Disable directed recover
Max auth attempts
Max auth thread count
My hostname
Name
NW instance ID
NW instance info operations
NW instance info file
Resource Attribute
private key
VSS writers
8.0 and later 7.6.x l Audit messages generated from the NetWorker server
are logged to the nsrlogd daemon.
l Audit message are not generated by the NetWorker
client.
l A NetWorker client cannot run the nsrlogd daemon.
7.6.x 8.0 and later l Audit messages are not generated by the NetWorker
server.
l Audit messages are generated by the client but without
a NetWorker 8.0 server or later, the client cannot be
configured to run the nsrlogd daemon.
l The RenderedMessage is: Failed to modify Resource type: 'NSR usergroup', Resource
name: 'Users' for Attribute: 'users' by user: 'administrator' on host:
'nwserver.emc.com'.
nsrd Permission denied, user 'username' on 'hostname' does not have 'privilege1' or
'privilege2' to create configure this resource - resource_type
This message appears when a user attempts to create a security-related resource but
does not have the required privileges on the NetWorker server.
For example:
nsrd Permission denied, user 'username' on host: 'hostname' does not have privilege1' or
'privilege2 privilege to configure this resource - resource_type
This message appears when a user attempts to modify an security-related attribute in a
resource but does not have the required privileges.
For example:
For example:
gstd Console: User 'username' failed to login to Console server on host 'hostname'
This message appears when you specify an incorrect username or password on the NMC
server login window.
For example:
gstd Console: User 'username' logged out of Console server on host 'hostname'
This message appears when a user closes the Console window and connection to the
Console server.
For example:
14/08/2014 4:36:21 PM 0 gstd Console: User 'administrator'
logged out of Console server on host 'bu-
iddnwserver.iddlab.local'
This changes the location of the security audit log file. The default location is /nsr/
logs on a UNIX Audit Log server and NetWorker_install_path\nsr\logs on
a Windows Audit Log server.
6. Optionally, change the maximum size of the security audit log in the auditlog
maximum file size (MB) attribute.
When the log file reaches the maximum size, NetWorker renames the security audit
log file for archival purposes and creates a new security audit log file.
The default value for the auditlog maximum file size (MB) attribute is 2 MB.
7. Optionally, change the maximum number of the audit log file versions that NetWorker
maintains, in the auditlog maximum file version attribute.
When the log file version reaches the maximum number, NetWorker removes the
oldest archived version of the security audit log file before creating the new log file.
The default value for the auditlog maximum file version attribute is 0, which means
that NetWorker maintains all versions.
8. Optionally, change the audit message severity to increase or decrease the volume of
messages saved in the security audit log in the auditlog severity attribute.
The following severity levels are available:
l Information
l Notice
l Warning
l Error - selected by default
l Severe
l Critical
Changes to the attribute apply to each client that generates security related events.
For example, if the security audit log severity attribute is Information, all clients will
send messages with the Information severity level. The Information and Notice level
audit messages are very common. If the security audit log records too much or too
little detail, then adjust the severity level accordingly.
Note
This field also controls remote client security audit configuration. At the information,
notice and warning levels, nsrd broadcasts the security configuration to all clients
during startup. At other levels, supported clients request the security configuration
from the NetWorker server as needed, the nsrd daemon does not broadcast security
configuration during startup.
9. Optionally, use a third party logging service to send security audit log messages to by
using the auditlog rendered service attribute. The following table describes the
available options.
Option Description
None l The default value.
l Writes unrendered security audit log messages to the
NetWorker_server_sec_audit.raw file only.
l Use the nsr_render_log program to render the log file into a
readable format.
Option Description
Local l Writes rendered security audit log messages to
theNetWorker_server_sec_audit.raw file.
l Writes unrendered security audit log messages to the
NetWorker_server_sec_audit.raw file.
syslog l Writes rendered security audit log messages to the UNIX syslog.
l Writes unrendered security audit log messages to the
NetWorker_server_sec_audit.raw file.
eventlog l Writes rendered security audit log messages to the Windows Event
Log.
l Writes unrendered security audit log messages to the
NetWorker_server_sec_audit.raw file.
10.Optionally, specify the locale for the rendered audit log file in the auditlog rendered
locale attribute. If this attribute is empty, the default locale en_US is used. The Multi-
locale data zone considerations section in the NetWorker Installation Guide describes
how to install and configure the NetWorker software on a machine that uses a non-
English locale.
The following figure provides and example of the Security Audit Log Properties
resource.
Figure 13 Security Audit Log resource
11.Click OK.
12.Review theMonitoring > Log > window to ensure that the configuration change
completes successfully.
For example:
l If the host specified in the auditlog hostname attribute supports security audit
logging and the nsrlogd daemon is successfully started, a message similar to the
following appears:
Note
Users that belong to the Security Administrators User Group, but not the Application
Administrators User Group cannot see messages in the Logs window.
A Recovery wizard 88
AD users, save command 88
Adding 36 Scheduled backups 87
Deleting 38 Starting NetWorker daemons on UNIX 83
Modifying 37 Starting NetWorker daemons on Windows 83
AD, Post configuration 26 Starting NMC server 84
Administrator list, modifying 39 Debug mode, Using savegrp 88
AES encryption
Configuring client resource 117 E
Defining pass phrase 117 Encrypting data 116
Recovering data 119 Environment variables, NMC server debug mode 85
Recovering with NetWorker User 119
Recovering with the NMC Recovery wizard 119
Recovering with the recover command 120 F
Using with NetWorker User 118 FIPS (Federal Information Processing Standard
Using with the save command 118 Compliance) 120
audience 9
Audit log server
G
Message format 134
gstd.raw, size management 81
single data zone 128
Multiple data zones 129, 130
Audit log server, L
modifying 136 LDAP users,
Authentication configuration issues, troubleshooting 31 Adding 36
Authentication methods, Deleting 38
Modifying 53 Modifying 37
Modifying with NMC 53 LDAP, Post configuration 26
Modifying with nsradmin 54 Lockbox resource, modifying 116
Auto media verify attribute 122 Log files
Configuring logging levels 83
Locations of 72
B rap.log 82
BSAFE 120
Rendering at runtime 78
Rendering manually 76
C Viewing 76
Centralized security logging 127 Login errors, troubleshooting 35
Certificate key
Creating 66
M
Client initiated backups, restricting 69
Manual save operations, restricting 69
comments 9
Manually erasing data
Component authentication 51
AFTD 126
Component authorization 67
Tape and VTL 126
conventions for publication 9
Monitor RAP 127
D N
daemon.raw, size management 81
NetWorker Server, authorization 39
Data integrity, Verifying 122
networkr.raw, size management 81
dbgcommand 86
NMC server service ports, Confirming 107
Debug levels
NMC users
Setting 83
Adding 18, 19
Debug mode
Deleting 19
dbgcommand 86
NSR Peer Information resource
nsrtask 89
Deleting 61, 63
Recoveries 88
Maintaining 59