007-007850-401 SMCII v4 0C CRN
007-007850-401 SMCII v4 0C CRN
007-007850-401 SMCII v4 0C CRN
0C
Release Notes
Version: 4.0C Build 1337
Release Notes Issue Date: October 11, 2010
Updated: N/A
Product Description
SafeNet Security Management Center (SMCII) redefines network security management. A robust, Web-based,
management platform, the SMCII centrally manages encryptors deployed on the enterprise network. SMCII
remotely configures, monitors, and performs firmware updates, thereby reducing the cost of network security
management.
SMCII supports the following SafeNet high speed network encryptor families:
Version Summary
This version is released for general distribution. Please refer to the Advisory Notes and Known Issues and
Workarounds sections for limitations and restrictions.
Release Description
SMCII 4.0C is a feature enhancement release to version 3.5C and prior releases. This release includes:
Solaris Version: 4.0C build 1337
Windows Version: 4.0C build 1337
Released Components
SMCII 4.0C for Solaris 10 installation: smcSetup.bin
SMCII 4.0C for Windows installation: smcSetup.exe
SMCII User’s Guide (English): Web-based Help
SMCII Companion User’s Guide: SMCII_V4.0C_Companion_User_Guide.pdf
SMCII Installation Guide: SMCII_V4.0C_Installation_Guide.pdf
SMCII Cluster Setup Guide: SMCII_V4.0C_Clustering_Guide.pdf
SMCII Data Replication Setup Guide: SMCII_V4.0C_Replication_Guide.pdf
Supported Environments
Server Systems:
Supported Operating Systems:
Solaris™ 10 SPARC platform
Windows Server® 2008 SP2 (32-bit)
Windows Server® 2008 SP2 (64-bit)
Windows Server® 2008 R2
Windows Server® 2003 R2 (32-bit only)
Windows 7® Enterprise (32-bit and 64-bit)
Windows Vista® Business (32-bit and 64-bit)
Windows XP® Professional (32-bit)
Hardware Requirements:
*Minimum:
Server: Sun SPARC™ Enterprise Server (single CPU or more), 2 GB RAM
Intel Pentium 4 processor, 2 GB RAM
Clustered Servers: Sun SPARC™ Enterprise Server (single CPU or more), 8 GB RAM (each)
Network Performance:
*Minimum:
Server: 10/100 Mbs throughput
Recommended:
Server: 100 Mbs throughput
*Note: Minimum requirements are for small SafeNet managed networks. No more than several
managed encryptors are recommended.
Client Systems:
Supported Operating Systems:
Solaris 10
Windows 7, XP, Vista, 2003, and 2008 Server
Supported Browsers:
Mozilla Firefox 3.5 and higher
Internet Explorer 8
Device Import and Export—Import and Export tools are used to seamlessly and securely back up or
restore all or a subset of devices managed by the SMCII from/to a CSV file. Sensitive fields in the CSV
file can be encrypted using a password-based AES key. Import and export of the device table are
recorded in the Audit Log.
License Enforcement—This feature allows the user to change the license tier so SMCII can manage
more network devices. By default, SMCII is installed with a Tier 1 license, which does not require a
license code. However, a license code is required to unlock higher tiers.
Multiple Signing Key Pairs (Keysets)—This feature allows the user to create multiple signing key
pairs to certify sets of devices (SAEII/SCE/SEE/SSE). A keyset (signing pair) is comprised of two self-
signed key pairs—a1024-bit key pair, and a 4096-bit key pair. In a Pairing configuration, keysets are
shared, so the devices that are owned by remote nodes can be certified using the corresponding
server's keyset.
Device Status Bar—The status bar displays important summary information about the device, such as
the unit name, management IP address, the firmware version, and color-coded status settings of each
LED on the front of the device.
Date Filter Controls—This is extended functionality of filtering criteria used with the Script Run History
Log, and the Alarm, Event, and Audit Logs. These quick controls provide helpful options to pre-fill date
filters with common values. The user can select yesterday’s date, last week’s date, etc., and then further
modify the date by using the filtering controls to choose a range of days, weeks, or months to move
backward or forward in time.
Pairing Enhancements—The Pairing status page displays the following additional information:
o Whether pairing is fully operational with another node
o The last full sync with another node
o The last incremental update from another node
o When the last error from another node occurred
Device Firmware Support Updated for SEE and SEE Branch Office—The SEE v4.0 and Branch
Office v2.0 firmware updates add significant new features to the Ethernet devices. Refer to the device
documentation for more details. The key updates include:
o End-to-end interoperability across devices from 10Mbps to 10Gbps
o Support for Multicast MAC Address-based encryption
o Support for VLAN ID-based encryption
o Password strength enhancements
Advisory Notes
Client Browser Settings
After installing SMCII, JavaScript must be enabled in the browser running the SMCII client software.
The 'binary and script behavior' option must be enabled in Internet Explorer 8 (IE8). This allows the
status bar to appear against a transparent background, rather than a grayed out, opaque
background.
The address bar in IE8 displays 'Certificate Error' and highlights the Web address in red, until the
Self-signed SafeNet SMCII is installed in the Trusted Root Certification Authorities Store of the
machine.
By default, SMCII does not support automatic restart of the MySQL cluster processes after server
reboot. The administrator must manually restart the MySQL cluster management and NDB cluster
processes per the instructions in the SMCII Cluster Setup Guide. Alternatively, a Solaris
administrator with sufficient expertise could create a shell script to run in /etc/rc3.d and be
configured to start before /etc/rc3.d/S98mysql.
After restoring a database in a cluster configuration, the user may receive an error after executing
the recoverdatabasekey script. This script looks for an apollodb.audit_entry which does not exist at
this time. To resolve this, restart the SMCII application service on Windows and the S99smcjboss
service on Solaris. This will do the GEK recovery. After recovery, the user will automatically be
prompted to restart the server again. The databasekeyrecovery script relies on being able to log an
audit log message about the key recovery. If SMCII has not run on that server yet, the audit log
table doesn't exist, so the message can't be logged.
All server data nodes must be configured to resolve cluster member host names by either
/etc/hosts or DNS. (Other hostname/IP name resolution solutions may work, but they have not
been verified by SafeNet.)
For load balancing scheduled jobs/tasks, it is highly recommended that Network Time Protocol
(NTP), or other system clock synchronization, be configured to keep the SMCII cluster nodes in
sync. Otherwise, if their clocks are out of sync by more than 2-3 seconds, only one server (the
faster server by time) will execute all jobs/tasks.
Note: Refer to the SMCII Server with Multiple Network Interface Cards (NICs) section in this
document for related issues.
Pairing
SMCII servers cannot be paired across versions. Due to the potential for changes within the
database schema, pairing across versions is not supported.
Pairing also requires that all SMCII servers being paired are able to resolve each other’s host
names. This can be done either automatically (by using the network DNS server), or manually (by
adding the host names to the host files of the respective SMCII servers).
In a pairing configuration, device operation may lead to an usmDHUserOwnPrivKeyChange SNMP
error response. Ignore the error message and refresh the browser instance.
Reference: 74936
Restoring an SMCII database to another SMCII server and configuring pairing between those two
servers will not replicate the devices already present in the database. After restoring the database,
but before setting up pairing, go to Administration > System Configuration > System, delete the
property named com.safenetinc.smc.system.ServerUniqueId, and then restart both servers. Only
new devices (added after the pairing is configured) will be replicated.
Reference: 82354
HighAssurance Remote
HighAssurance Remote operating in the Solaris environment incorrectly fragments large packets.
This introduces several complexities:
When upgrading or deploying the SSE, SEE, SCE, or SAEII running the 3.4.0 or newer
firmware, HighAssurance Remote will interfere with the use of v2 certificates during device
certification. To enable management of the noted devices with the 3.4.0 firmware image, you
must disable HighAssurance Remote on the Solaris server during the certification process.
While the SLE is not managed via IPSec, the Solaris HighAssurance Remote must be disabled
for similar reasons as those outlined above.
(MySQL Cluster-specific) Legacy SMC 2.0 database migration may fail in cluster configuration
for SMCII. Temporarily disable HighAssurance Remote on all cluster nodes while performing
database migration.
o To stop HighAssurance Remote, run:
/opt/SafeNet/HARemote/stop_vpn
o To start HighAssurance Remote, run:
/opt/SafeNet/HARemote/start_vpn
References: 31830, 62997
Contact SafeNet Technical Support to obtain assistance with restoring the version 1.2 backup
images if restoring one of them is necessary, and fails.
To specify which network interface is to be used for HighAssurance Remote in a multiple NIC
environment, make the following changes in the /etc/init.d/vpnclient file:
Change bge1 (if necessary) to the interface you want to use for HighAssurance Remote and
SMCII.
Note: Depending on the network hardware installed on the Solaris server, the interface may not
be named bge0 or bge1. For example, hme and e1000g are possible interface prefixes as well.
Use ifconfig –a to determine the interface name required.
o Configuring SMCII Firmware Download, SNMP Proxy Agent, and SNMP Trap Listener to
Bind with Specific IP Address
Firmware Download, SNMP Proxy Agent, and SNMP Trap Listener will default to the value of
the smc.server.hostaddress property, as set in the file
<SMCII_INSTALL_DIRECTORY>/jboss/server/default/conf/system.properties.
After setting the property, restart the SMCII server. An SMCII user with administrator privileges
is required to stop the SMCII server:
Link Encryptors
There is no error checking for the correct SLE device type. Select a valid SLE device type in the
drop-down menu and double-check to ensure it matches correctly with the hardware device type.
Reference: 33265
The configuration timeout settings for SLE devices are longer than expected; however, no action is
required by the user. The configuration timeout is set to an Exponential Backoff algorithm, where
Timeout = 5 and Retry = 3, retransmit occurs at 0 (first), 5 (R1) + 10(R2) + 20(R3) + 40(final
timeout) = 75 secs.
Reference: 33438
General
Duplicate IP addresses are, by design, allowed to be entered into SMCII. However, the
administrator will need to verify the IP address and network configuration and communication to be
certain that that is what is intended.
When opened with third-party programs such as Microsoft Excel, the contents of CSV files may be
interpreted by the program in use. Refer to the third-party documentation for control of formatting for
display purposes.
If SMCII is running on a system that does not meet SMCII’s system requirements, the keystore
migration from SMCII’s database to the Luna hardware security module fails with an exception. The
workaround to this issue is to add the following property in SMC_HOME/jboss/server/default/conf/
system.properties: smc.bootstrap.start.luna=true and then restart the SMCII server.
Resolved Issues
Severity Classification Definition
C Critical No reasonable workaround exists
H High Reasonable workaround exists
M Medium Medium level priority problems
L Low Lowest level priority problems
Publications
The following publications are associated with this release:
SafeNet Security Management Center II Cluster Setup Guide, 007-007850-403 (September 2010)
SafeNet Security Management Center II Data Replication Setup Guide, 007-007850-404 (September 2010)
SafeNet Security Management Center II Installation Guide, 007-007850-402 (September 2010)
SafeNet Security Management Center II User’s Guide, 007-007850-400 (September 2010)
We have attempted to make these documents complete, accurate, and useful, but we cannot guarantee them to be perfect. When we
discover errors or omissions, or these issues are brought to our attention, we endeavor to correct them in succeeding releases of the
product.