Data ONTAP : Best Practices for Secure Configuration



Similar documents
Data ONTAP 8.2. MultiStore Management Guide For 7-Mode. NetApp, Inc. 495 East Java Drive Sunnyvale, CA U.S.

Case Study and Tutorial: HTTPS Reverse Proxy and Authentication with LDAP

OnCommand Unified Manager

Setting up CIFS shares and joining the Active Directory. Why join an N series storage system to Active Directory?

Data ONTAP 7.3 File Access and Protocols Management Guide

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

File Access and Protocols Management Guide For 7-Mode

Data ONTAP 7.3 System Administration Guide

Oracle ZFS Storage Appliance Security Guide

How To Manage A System On A Pc Or Mac Or Mac (Or Mac) With A Hard Drive Or Ipnet (Or Ipnet) On A Computer Or Mac) On Your Computer Or Computer (Or Pc Or Pc Or Ipro) On

At A Glance. Guide To NetApp Certification

SnapDrive for UNIX Quick Start Guide (IBM AIX, HP-UX, Linux, Solaris )

Security. TestOut Modules

Formation NetApp Accelerated NCDA

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Integrating Mac OS and NetApp Storage

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

Data ONTAP 7.3 Data Protection Online Backup and Recovery Guide

CTS2134 Introduction to Networking. Module Network Security

SnapManager 5.0 for Microsoft Exchange Installation and Administration Guide

OnCommand Performance Manager 1.1

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

SnapDrive 7.1 for Windows Installation Guide

SnapManager 7.0 for Microsoft Exchange Server

Data ONTAP DSM for Windows MPIO Release Notes

Clustered Data ONTAP 8.2

Network Security Fundamentals

CUIT UNIX Standard Operating Environment and Security Best Practices

This chapter describes how to set up and manage VPN service in Mac OS X Server.

File Services. File Services at a Glance

SnapManager 6.1 for Microsoft Exchange Server

Data ONTAP 8.2. Software Setup Guide For 7-Mode. NetApp, Inc. 495 East Java Drive Sunnyvale, CA U.S.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

NetApp Storage System Plug-In for Oracle Enterprise Manager 12c Installation and Administration Guide

How to deploy OnCommand Unified Manager - Best Practices Guide

V-Series Systems Implementation Guide for EMC CLARiiON Storage

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

Cyber Essentials. Test Specification

Clustered Data ONTAP 8.2

SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

MongoDB Security Guide

Isilon OneFS. Version OneFS Migration Tools Guide

How To Set Up Egnyte For Netapp Sync For Netapp

How To Use Directcontrol With Netapp Filers And Directcontrol Together

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

Networking Configurations for NetApp Cloud ONTAP TM for AWS

My FreeScan Vulnerabilities Report

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Caché Integration with a Network Appliance Filer

LINUX SECURITY COOKBOOK. DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes

Open Systems SnapVault (OSSV) Best Practices Guide

Introduction to Endpoint Security

Executive Summary and Purpose

Locking down a Hitachi ID Suite server

OnCommand System Manager 3.1

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Fibre Channel and iscsi Configuration Guide

EMC VNXe Series. Configuring Hosts to Access CIFS File Systems. Version 3.1 P/N REV. 03

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

Security Considerations White Paper for Cisco Smart Storage 1

Quality of Service (bandwidth limitation): Default is 2 megabits per second.

Use QNAP NAS for Backup

Granite Solution Guide

Quick Start Guide. Sendio System Protection Appliance. Sendio 5.0

Nasuni Management Console Guide

NETASQ MIGRATING FROM V8 TO V9

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

Clustered Data ONTAP 8.3 Administration and Data Protection Training

SnapDrive for Windows

NetApp Training and Certification 2009

Logical Replication (LREP) Tool User Guide

How To Manage File Access On Data Ontap On A Pc Or Mac Or Mac (For A Mac) On A Network (For Mac) With A Network Or Ipad (For An Ipad) On An Ipa (For Pc Or

Cannot send Autosupport , error message: Unknown User

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Web Plus Security Features and Recommendations

IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE

NETASQ ACTIVE DIRECTORY INTEGRATION

Data Protection Online Backup and Recovery Guide For 7-Mode

OnCommand Cloud Manager 2.2 Storage System Management Guide

Configuring Security Features of Session Recording

How To - Implement Clientless Single Sign On Authentication with Active Directory

Virtual Storage Console 4.0 for VMware vsphere Installation and Administration Guide

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Step-by-Step Configuration

Solution of Exercise Sheet 5

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

EXPLORER. TFT Filter CONFIGURATION

ReadyNAS Setup Manual

Insecure IP Storage Networks. Presenter: Himanshu Dwivedi Regional Technical Inc.

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Setting Up Scan to SMB on TaskALFA series MFP s.

Isilon OneFS. Version 7.2. OneFS Migration Tools Guide

Xerox DocuShare Security Features. Security White Paper

ProCurve Networking. Hardening ProCurve Switches. Technical White Paper

Transcription:

Data ONTAP : Best Practices for Secure Configuration Network Appliance, Inc. July 2006 TR-3445 Abstract This paper provides guidelines on secure configuration of NetApp systems (including NetApp storage systems) running Data ONTAP. It is intended for storage and security administrators who wish to improve the overall security posture of their storage networks. For each configuration area, only the most secure settings are provided. Just as with any other information technology, an improvement in the overall level of security may result in a reduction in functionality or usability; put another way, most security problems can be viewed as excess functionality, and administrators should be cautious when applying these configurations to avoid interruption of required services. The second part of this paper provides a high-level discussion of Data ONTAP security concepts within the context of a documentation map that should allow security administrators to develop a good working knowledge of Data ONTAP security, even if they have no prior storage management experience.

Table of Contents 1. Best Practice Security Configuration... 3 1.1 Administrative Access... 3 1.1.1 Role-Based Access Control... 4 1.2 NFS s... 5 1.2.1 The /etc/exports File... 6 1.3 CIFS s... 7 1.4 Multi-Protocol s... 8 1.5 Network Configuration... 9 1.6 System Services... 10 1.6.1 Protocol Access Filter... 11 1.7 iscsi s... 12 2. Security documentation map... 12 2.1 Administrative Guidance... 13 2.2 User Guidance... 17 2

1. Best Practice Security Configuration This section provides specific settings and option values that may be used to configure a NetApp storage system in the most secure possible fashion. Note that many of the settings described below are already set to the most secure value by default and thus do not require modification on a new system; however the complete list is provided to assist in auditing systems that have already been deployed. 1.1 Administrative Access Data ONTAP Configuration: Administrative Access ROOT PASSWORD Sets the password for the root account. Use a strong password for the root account. filer# passwd root [password] TRUSTED HOSTS ACCESS Enables/disables the ability for certain hosts to access NetApp storage systems without authentication. Disable the trusted host option. filer# options trusted.hosts - TELNET ACCESS Enables/disables telnet access to the NetApp storage system. RSH ACCESS HTTP ACCESS SECUREADMIN Disable telnet access. filer# options telnet.enable off Enables/disables RSH access to the NetApp storage system. Disable RSH access. filer# options rsh.enable off Enables/disables HTTP (web) access to the NetApp storage system. Disable HTTP (web) access. filer# options httpd.admin.access host=none Enables SecureAdmin for SSH and SSL security features. Install SecureAdmin. filer# secureadmin setup f ssh filer# secureadmin enable ssh filer# secureadmin setup ssl filer# secureadmin enable ssl RESTRICT SSH LOGINS Filters access to SSH to only authorized SSH clients. Limit access to the NetApp storage system to authorized SSH clients only. 3

Data ONTAP Configuration: Administrative Access filer# options ssh.access host=[ipaddress],[ipaddress],[hostname] NON-ROOT USERS Creates additional accounts on the NetApp storage system. Create non-root users accounts for each administrator. filer# useradmin useradd [username] AUTOMATIC LOGOUT Enables and sets an automatic logout for console and network sessions to the NetApp storage system Enable automatic logoff. The specific number of minutes you configure should be based on your local security policy. filer# options autologout.console.enable on filer# options autologout.telnet.enable on filer# options autologout.console.timeout 30 filer# options autologout.telnet.timeout 15 LOGGING ADMINISTRATIVE ACCESS Enables and configures logging for administrative sessions. Enable logging for administrative sessions. The log file size specified depends on your local security policy, but should be large enough to record several days worth of administrative usage at a minimum. You may wish to set this to a large value (several megabytes, at least) and then adjust the size once you have an understanding of how quickly it fills up in your environment. filer# options auditlog.enable on filer# options auditlog.max_file_size [logfilesize] HOSTS.EQUIV ACCESS File containing trusted remote hosts for access without authentication. Disable host.equiv access. filer# options httpd.admin.hostsequiv.enable off PASSWORD CHECKS Controls whether a check for minimum-length and password composition is performed when new passwords are specified. Enable password checks. filer# options security.passwd.rules.enable on 1.1.1 Role-Based Access Control Role-based access control (RBAC) is a method for managing the set of actions that a user or administrator can perform on the NetApp storage system. Role-based access controls allow you to define sets of capabilities (roles) that are not assigned to any particular user. Users are assigned to groups based on their job functions, and each group is granted the set of roles required to perform those functions. For more information on RBAC, please refer to NetApp technical report TR 3358 (http://www.netapp.com/library/tr/3358.pdf). 4

1.2 NFS s Data ONTAP Configuration: NFS s KERBEROS AUTHENTICATION Enables Kerberos authentication for NFS. Requires NFS clients to support Kerberos. LDAP AUTHROZATION IPSEC EXPORTS FILE Enabled NFS authentication with Kerberos filer# nfs setup [After performing the nfs setup command, edit /etc/exports on the NetApp storage system to set sec=krb5, sec=krb5i or sec=krb5p in the options field of the exported filesystems. ] Please refer to technical report http://www.netapp.com/library/tr/3481.pdf for more information. Enables LDAP directory lookup service for user authorization. SSL is also supported for secure connection. Enable NFS user lookup for authorization Enable LDAP over SSL or SASL filer# options ldap.enable on filer# options ldap.ssl.enable on Please refer to technical report http://www.netapp.com/library/tr/3464.pdf for more information. Enables IPSec between NFS clients and the NetApp storage system. Enable AH authentication and ESP payload encryption between NetApp storage systems and clients. N/A Lists of file systems on the NetApp storage system that are exported. Ensure that only data file systems are exports and not administrative file systems, such as /etc. Additionally, ensure all world readable exports are read-only. Examine the /etc/exports file on the NetApp storage system. Please refer to section 1.2.1 below for more information. NFS OVER TCP Enables NFS sessions using TCP packets instead of UDP. NFS MOUNT REQUEST Enable NFS over TCP. TCP is generally more secure than UDP, and may facilitate use of NFS across firewall boundaries. However, enabling NFS traffic through a firewall opens up so many ports in both directions that in most cases it is better to deploy the NFS clients and servers within the same security zone, rather than to pass the traffic over a firewall. filer# options nfs.tcp.enable on filer# options nfs.udp.enable off Enables/disables NFS mount request over high numbered ports. Restrict NFS mounts to low numbered ports only. filer# options nfs.mount_rootonly on 5

1.2.1 The /etc/exports File You can use the man na_exports command to get an exhaustive description of all the available options for NFS export in Data ONTAP. The rest of this section describes the options related to security. Access Rules It is important to make sure that the appropriate security options are used in the NFS export to prevent unsolicited clients from mounting or gaining elevated access rights to the desired volumes on the NetApp storage system. In the following example, suppose that you want to grant read-write permission on volume /vol/volx to host1, read-only permission to host2, and no other hosts can mount the volume. In versions of Data ONTAP earlier than 6.5, enter: /vol/volx -access=host1:host2,rw=host1 In Data ONTAP 6.5 and later, enter: /vol/volx -rw=host1,ro=host2 Security-Related Export Options The following NFS export options are related to security. It is important to note that these options should be used appropriately in order to secure the data in an NFS environment. anon This option specifies the effective user ID (or name) of all anonymous or root NFS client users that access the file system path. An anonymous NFS client user is an NFS client user that does not provide valid NFS credentials; a root NFS client user is an NFS client user with a user ID of 0. Data ONTAP determines a user's file access permissions by checking the user's effective user ID against the NFS server's /etc/passwd file. By default, the effective user ID of all anonymous and root NFS client users is 65534. To disable root access by anonymous and root NFS client users, set the anon option to 65535. To grant root user access to all anonymous and root NFS client users, set the anon option to 0 this is equivalent to the no_root_squash option in some other NFS servers. nosuid This option disables setuid and setgid executables and mknod commands on the file system path. Unless the file system is a root partition of a diskless NFS client, you should set the nosuid option to prevent NFS client users from creating setuid executables and device nodes that careless or cooperating NFS server users could use to gain root access. sec Starting with version 6.5, Data ONTAP supports the ability to specify multiple security (sec) options for each exported resource. The administrator can determine how secure NFS access is to the NetApp storage system. Basically, the following two security service types are supported. UNIX (AUTH_SYS) authentication (sys): Does not use strong cryptography and is the least secure of the security services. This is the default security service used by Data ONTAP. It is important to note that AUTH_SYS credentials are basically a user ID and up to 17 group IDs. Once logged in as a superuser on a UNIX system, one could use the su command to become a user who is allowed full access to a volume. One way to prevent this scenario from happening is to implement strong authentication mechanisms such as Kerberos. 6

Kerberos version 5: Provides the following three security methods: o Authentication (krb5): Uses strong cryptography to prove a user s identity to a filer and to prove a filer s identity to a user. o Integrity (krb5i): Provides a cryptographic checksum of the data portion of each request and the response message to each request. This defends against man in the middle tampering with filer NFS traffic. o Privacy (krb5p): Encrypts the contents of packets bidirectionally, including procedure arguments and user data, using a shared session key established by the client from the filer. The following two examples show how the above security services are used: To specify one security type, you could enter: /vol/volx sec=sys,rw=host1 To specify multiple security types, you could enter: /vol/volx sec=krb5:krb5i:krb5p,rw=host1 For more information on setting up NFS using Kerberos authentication, refer to technical report http://www.netapp.com/library/tr/3481.pdf when a UNIX-based KDC is used, http://www.netapp.com/library/tr/3457.pdf when an AD-based KDC is used. 1.3 CIFS s Data ONTAP Configuration: CIFS s KERBEROS AUTHENTICATION Enables AD authentication, which uses Kerberos by default LDAP AUTHORIZATION SMB SIGNING Use Active Directory authentication to support Kerberos Select a Microsoft Active Directory domain during CIFS setup. Please see technical report http://www.netapp.com/library/tr/3457.pdf for more information. Enables AD LDAP for user authorization Enable LDAP signing and sealing with SASL Enable LDAP over SSL Please see technical report http://www.netapp.com/library/tr/3458.pdf for more information. Enable SMB signing to ensure the integrity of CIFS communications Ensure that SMB signing is enabled on both the NetApp storage system and the Windows clients On the NetApp storage system: filer# options cifs.disable_server_smbsign off On the Windows client: Enable EnableSecuritySignature and RequreSecuritySignature parameters in the registry SHARE LEVEL PERMISSIONS 7

Data ONTAP Configuration: CIFS s Sets the share level permission on the NetApp storage systems CIFS shares AUDIT CIFS ACCESS Change the share level ACL to authorized users only and remove Evereyone/Full Control. filer# cifs access <sharename> [-g] <user group> <rights> Audits CIFS access. Enable the auditing on CIFS access to the NetApp storage system filer# options cifs.audit.enable on ANONYMOUS CONNECTIONS (RESRICT ANONYMOUS) Enables/disables anonymous users from listing CIFS shares on the NetApp storage system GUEST ACCESS Disable access to CIFS shares and sharenames from unauthenticated users. filer# options cifs.restrict_anonymous.enable on Enables/disables CIFS guest access Disable CIFS guest access filer# options cifs.guest_account 1.4 Multi-Protocol s Data ONTAP Configuration: Multi-Protocol s IGNORE ACLS When on, ACLs will not affect root access from NFS. The option defaults to "off". Disable the ignoring of any ACLs filer# options cifs.nfs_root_ignore_acl off CIFS BYPASS TRAVERSE CHECKING When on (the default), directories in the path to a file are not required to have the `X' (traverse) permission. This option does not apply in UNIX qtrees. CIFS GID CHECKS Enable traverse checking by turning this option off. filer# options cifs.bypass_traverse_checking off This option affects security checking for Windows clients of files with UNIX security, where the requestor is not the file owner. In all cases, Windows client requests are checked against the share-level ACL, and then if the requestor is owner, the "user" perms are used to determine the access permissions. If the requester is not the owner and if cifs.perm_check_use_gid is on it means files with UNIX security are checked using normal UNIX rules, i.e. if the requester is a member of the file's owning group the "group" perms are used, otherwise the "other" perms are used. If the requester is not the owner and if cifs.perm_check_use_gid is off, files with UNIX security style are checked in a way that works better when controlling access via share-level ACLs. In that case, the requester's desired access is checked against the file's "group" permissions, and the "other" permissions are ignored. In effect, the "group" perms are used as if the Windows client was always a member of the file's owning group, and the "other" perms are never used. Enable CIFS GID checks to require UNIX style security. 8

Data ONTAP Configuration: Multi-Protocol s filer# options cifs.perm_check_use_gid on DEFAULT NT USER Specifies the NT user account to use when a UNIX user accesses a file with NT security (has an ACL), and that UNIX user would not otherwise be mapped. Set the option to a null string, denying access. NOTE: Perform this step ONLY on multi-protocol systems that have NFS/CIFS usermapping configured correctly; disabling this access on a NFS-only NetApp storage system will result in access problems for legitimate users. filer# options wafl.default_nt_user DEFAULT UNIX USER Specifies the UNIX user account to use when an NT user attempts to log in and that NT user would not otherwise be mapped. Set the option to a null string, denying access. NOTE: Perform this step ONLY on multi-protocol systems that have NFS/CIFS usermapping configured correctly; disabling this access on a CIFS-only NetApp storage system will result in access problems for legitimate users. filer# options walf.default_unix_user ROOT TO ADMIN MAPPINGS When on (the default), an NT administrator is mapped to UNIX root Disable root to admin mappings by default. filer# options walf.nt_admin_priv_map_to_root off CHANGE PERMISSIONS When enabled, only the root user can change the owner of a file. CACHE CREDENTIALS Allow only root access to change permissions to files filer# options walf.root_only_chown on Specifies the number of minutes a WAFL credential cache entry is valid. The value can range from 1 through 20160 Set the minutes for 10 for cache credentials filer# options walf.wcc_minutes_valid 10 1.5 Network Configuration Data ONTAP Configuration: Network s INCOMING PACKETS Checks incoming packets for correct addressing MAC FASTPATH Enable packet checking for correct addressing. filer# options ip.match_any_ifaddr off The NetApp storage system will attempt to use MAC address and interface caching ("Fastpath") so as to try to send back responses to incoming network traffic using the same interface as the incoming traffic and (in some cases) the destination MAC address equal to the source MAC 9

Data ONTAP Configuration: Network s address of the incoming data. LOGGING PING FLOOD Disable this option. If enabled, this increases the ability for ARP spoofing and session hijacking attacks. filer# options ip.fastpath.enable off Enables/disables logging of ping flood attacks. Enable logging of ping attacks. filer# options ip.ping_throttle.alarm_interval 5 SNAP MIRROR ACCESS Sets the IP address and hostname for nodes that can received SnapMirror/SnapVault backups. Set IP address/hostnames to authorized users for backup filer# options snapmirror.access host=[ipaddress],[hostname] SNAP MIRROR SOURCE ACCESS Enables IP address based verification of snapmirror destination NetApp storage systems by source NetApp storage systems NDMP Enable source address verification. filer# options snapmirror.checkip.enable on Restricts control and data connections to authorized hosts. Limited backup using NDMP to authorized hosts only. filer# options ndmpd.access host=[ipaddress],[hostname] NDMP AUTHENICATION Sets the NDMP authentication type. Enabled MD5 authentication for NDMP. filer# options ndmpd.authtype md5 DATA FABRIC MANAGER Version of DFM. Ensure DFM version 3.0 or higher is used N/A 1.6 System Services Data ONTAP Configuration: System Services FTP Enables/disables FTP. PCNFS Disable FTP filer# options ftpd.enable off 10

Data ONTAP Configuration: System Services Enables/disables PCNFS. SNMP RSH TELNET TFTP Disable PCNFS filer# options pcnfs.enable off Enables/disables SNMP. Disable SNMP filer# options snmp.enable off Enables/disables RSH. Disable RSH filer# options rsh.enable off Enables/disables Telnet. Disable Telnet filer# options telnet.enable off Enables/disables TFTP. Disable TFTP filer# options tftpd.enable off 1.6.1 Protocol Access Filter Data ONTAP allows the installation of filters on for the following protocols to enhance security: rsh, telnet, ssh, httpd, httpd. admin, snmp, ndmpd, SnapMirror, and SnapVault. For a detailed description of the usage, refer to man page of the na_protocolaccess option. The filters can specify hostnames, IP addresses, IP subnets. or interface names, which are either allowed or disallowed for each protocol. Each application (telnet, ssh, etc.) attaches the filter to the listening socket. The following table shows some protocol access control examples. Command options ndmpd.access legacy Allow an NDMP server to accept a control connection request from any client. Command options rsh.access "host = gnesha.zo" Allow remote shell access for only one host, named gnesha.zo. Command options telnet.access host=10.42.69.1/24 Allow access for Telnet subnet 10.42.69. Command options ssh.access "host=abc,xyz AND if=e0" Allow ssh access for hosts abc and xyz when on network interface e0. Command options snmp.access if=e0,e1,e2 Allow access to SNMP for network interfaces e0, e1, and e2. 11

Command options httpd.access "if!= e3" Do not allow access to HTTPD for network interface e3. Command options httpd.admin.access host=champagne,tequila Allow access to administrative HTTPD for two hosts. Command options telnet.access "host=-" Disallow all access to Telnet. Command options snapmirror.access legacy Check access to sources from other NetApp storage systems. Command options snapvault.access all Allow a SnapVault server to accept any client requests. 1.7 iscsi s Data ONTAP Configuration: iscsi s PER-INTERFACE CONFIGURATION Enables/Disables iscsi driver on each network interface. Enable iscsi only on adapters where you intend to use it. filer# iscsi interface disable [-f ] {-a <interface> } DEFAULT SECURITY METHOD Selects the security method to use for initiators that do not have a security method specified. Set the default iscsi security method to deny, disabling access by initiators with no security method defined. filer# iscsi default s deny INITIATOR SECURITY METHOD Specifies the security method to be used for each specific iscsi initiator. Use CHAP authentication for all iscsi initiators. See the next entry for how to generate a random 128-bit password. filer# iscsi security add i initiator s CHAP p password n name RANDOM CHAP PASSWORDS Generates a 128-bit random password for use with iscsi CHAP authentication. Using this or another method of your choice, generate completely random passwords for use with iscsi CHAP authentication. filer# iscsi security generate 2. Security documentation map This section provides an overview of the security-relevant documentation available for Data ONTAP. It is intended to assist security administrators who are not storage experts in quickly learning enough about Data ONTAP security to make good deployment and configuration decisions. This is not an exhaustive list of all possible security resources, but should serve well as a starting point. This documentation map refers to the Data ONTAP 7.0 documentation; however documentation for other versions of Data ONTAP is organized in a similar manner. Always refer to the documentation for the version of Data ONTAP that you are actually using. The first section describes the administrative functions and interfaces available to the administrator, and how to administer Data ONTAP in a secure manner. The second section describes the limited set of security 12

interfaces and functions available to the users, describes the use of the user-accessible security functions, and includes warnings about user-accessible functions and privileges that should be controlled. Throughout both sections, frequent references are made to the Data ONTAP 7.0 documentation. This documentation is available on Network Appliance, Inc.'s web site at the following address: http://now.netapp.com/now/knowledge/docs/ontap/rel71 2.1 Administrative Guidance The first step to understanding the security-relevant administrative functions and interfaces of Data ONTAP is to understand the basic steps required to access and manage the NetApp storage system. The most important documentation on this subject is chapters 2, 3, 6 and 7 of the System Administration Guide. In particular, pay close attention to the following sections: Chapter 2: Interfacing with Data ONTAP How you administer a NetApp system. Chapter 3: Accessing the NetApp System Managing access from administration hosts. Controlling system access. Chapter 6: Managing Administrator Access Managing users. Managing roles. Chapter 7: Performing General System Maintenance Synchronizing filer system time. Configuring message logging. Configuring audit logging. Maintaining filer security through options. It is important to note that the "users" described in chapter 6 are local and should only be created and used for SYSTEM ADMINISTRATORS, and NOT for normal end users. In other words, when the Data ONTAP documentation refers to users or "local users or local user accounts", it should be interpreted as "local ADMINISTRATOR user accounts". It is possible, in some small workgroup environments, to use these local accounts for normal user access to files; however there are many security problems with this approach and customers who wish to use Data ONTAP in a secure manner should not consider it. Since the security of the administrative interfaces of the NetApp storage system depend on limiting access to authorized administrators, it is EXTREMELY IMPORTANT that administrator passwords be selected and managed very carefully. Great caution should be exercised to ensure that administrator passwords are difficult to guess; words found in any dictionary or wordlist (including names, dates, place-names, social security or other identifying numbers, etc.) should be avoided. Passwords should contain a mix of upper and lower case letters, punctuation marks, symbols, and numbers. Data ONTAP 7.0 provides an option to check for a minimum length and password composition when a new password is chosen; this option (security.passwd.rules.enable) is enabled by default but is not a substitute for a clear password selection policy and administrator training on correct password selection. In addition to the administration access methods listed in of Chapter 3 above ("Accessing the NetApp system"), the NetApp storage system may also be managed using the SSH remote login protocol or via an SSL-protected version of FilerView called Secure FilerView. These two methods are only available if the 13

SecureAdmin product is installed and configured on the NetApp storage system. SecureAdmin provides many security advantages over administrative access via telnet, rsh, and http, and should be strongly considered by any customer who wants to maximize security. More information on Secure admin can be found in Chapter 9 ( Using SecureAdmin ) of the System Administration Guide. Additional documentation for the SecureAdmin 3.0 product is available at: http://now.netapp.com/now/knowledge/docs/saon/rel30/pdf/secadmin.pdf Once administrative access has been configured, the next step for managing a secure NetApp storage system is to organize your data. The most important documentation for this process is in Chapter 6 ( Volume management ) and Chapter 7 ("Qtree Management") of the Storage Management Guide. In particular, pay attention to the following sections: Chapter 7: Qtree Management Understanding qtrees. Creating qtrees. Understanding security styles. Changing security styles. Although the choices for Volume and Qtree security styles may seem confusing at first, the selection process is actually very simple for most customers. If a volume or qtree is to be accessed predominantly or exclusively by NFS clients, select the "unix" style. If a volume or qtree is to be accessed predominantly or exclusively by CIFS clients, select the "ntfs" style. If a volume or qtree is to be accessed equally by both NFS and CIFS clients and both types of clients need full control over file access security, select the "mixed" style. If a volume or qtree is to be used exclusively as a storage location for FCP or iscsi LUNs, the security style has no effect. When creating volumes and qtrees for data management, it is strongly recommended that data be organized by security requirements. For example, if the NetApp storage system will store data for two groups (maybe the Finance and Engineering departments within a company) with different access controls, placing each data set in a separate qtree or on separate volumes will make security configuration simpler. After creating and configuring volumes and qtrees to store user data, Data ONTAP must be configured to identify users so that it can control access to data. Documentation about this subject is available the File Access Management Guide. Note that the users discussed in this chapter are NOT the local administrative users discussed above. Instead, these are the non-administrator users who access data stored by the system using NFS or CIFS. For security information, the most important sections of this document are: Chapter 2: File Access Using NFS. Read the entire chapter, especially the section on providing secure NFS access. Chapter 3: File Access Using CIFS. How CIFS users obtain UNIX credentials. Sharing directories. 14

Displaying and changing share properties. Understanding authentication issues. Understanding local user accounts. How share-level access control lists work. Specifying how group IDs work with share-level ACLs Changing and displaying a share-level ACL Changing and displaying file-level ACLs Chapter 7: File Sharing Between NFS and CIFS Using LDAP services Installing SecureShare Access. Changing UNIX permissions and DOS attributes from Windows. An important concept to remember is that there are really two different realms of security to manage when using Data ONTAP for file access; one realm is the security of the NetApp storage system running Data ONTAP, including security controls on exported filesystems (for NFS) and shared directories (for CIFS). The other is security of individual files and directories, which is controlled by the individual users who own each file or directory. This control is exercised from NFS clients using the chown and chmod unix commands, or from CIFS clients using the procedures in the "Changing and displaying file-level ACLs" and "Changing UNIX permissions and DOS attributes from Windows" sections. While the first kind of security is entirely controlled by authorized system administrators, the second kind is under the control of each individual nonadministrative user. Thus it is VERY IMPORTANT that users receive training and guidance on what policies and procedures should be followed for setting access controls and permissions on files and directories. Even if the NetApp storage system and the Data ONTAP operating system are managed in an entirely secure fashion, a user who sets incorrect ACLs or permissions on a sensitive file may inadvertently compromise the security of the data within that file. Programs must be implemented to ensure constant awareness and education of individual, non-administrative users on local security policy. Although Data ONTAP 7.0 provides support for the pc-nfs protocol, it is an inherently insecure protocol and should be avoided. Since NFS, CIFS, iscsi, and administrative clients access Data ONTAP over TCP/IP networking, it is important to configure the networking on the NetApp storage system in a secure fashion. The most important documentation for this purpose is the Network Management Guide, and in particular the following sections: Chapter 3: Network Routing Configuration. About routing in Data ONTAP. o About fast path. Chapter 4: Host Name Resolution. Chapter 8: Internet Protocol Security Configuration. In addition to the information supplied in chapter 3, one important configuration for secure deployments of NetApp storage systems with multiple network interfaces is the ip.match_any_ifaddr option. By default this option is turned on, which increases performance of the system but also increases exposure to certain types of IP forgery attacks. Turn this option off using the command "options ip.match_any_ifaddr off" on the command line interface. 15

Whenever possible, Network Appliance Inc. strongly recommends configuring and enabling IPSec as discussed in chapter 8. For systems configured to provide LUN access via iscsi, read the Block Access Management Guide for iscsi. In particular, pay attention to the following security-relevant sections: Chapter 4: Managing igroups. Chapter 6: Managing the iscsi Network. Managing security for iscsi initiators. Managing the iscsi service on filer interfaces. It is VERY IMPORTANT to enable CHAP authentication for all iscsi LUNs, and to select strong CHAP passwords. For systems configured to provide LUN access via FCP, read the Block Access Management Guide for FCP, and in particular Chapter 4 ("Managing Initiator Groups") within that guide. FCP security may also be enhanced by implementing zoning restrictions on the Fibre Channel switch that may be deployed as part of the configuration; check the documentation for your switch for details. Many switch vendors provide two forms of zoning, known as "hard" and "soft" zoning. Hard zoning is based on the physical port that a cable is connected to, and thus provides a better level of security than soft zoning in environments where the switch is in a physically secure location. Regardless of the types of data stored on the system or which methods are used to access that data, backups must be performed to protect the data in the event of a system failure or other disaster. Data ONTAP provides the capability of backing up data to local tape devices, in which case there are no security considerations, aside from ensuring only authorized administrators gain possession of the backup tapes. Data ONTAP also provides several methods (SnapMirror, SnapVault, and NDMP) that may be used to perform backups over a TCP/IP network. This kind of network backup has security considerations that must be addressed. The Data Protection Online Backup and Recovery Guide provides information about how to configure security for these kinds of backups, including: Chapter 4: Data Protection Using SnapMirror. Specifying destination filers on the source filer. Chapter 5: Data Protection using SnapVault. up SnapVault backup on Open Systems platforms Managing SnapVault backup of Open Systems platforms. Enabling SnapVault Note that Open Systems SnapVault is a software product that allows data from a Windows, Unix or Linux system to be protected by backing it up to a NetApp storage system running Data ONTAP. Security procedures on the Windows, Unix or Linux backup client systems (other than SnapVault settings and NDMP) are outside the scope of this document. The Data Protection Online Backup and Recovery Guide also contains information in Chapter 9 ("Virus Protection for CIFS") on how to provide virus scanning services for files accessed via CIFS. This functionality requires a third party AntiVirus Scanner system from McAfee, Computer Associates, Symantec, or Trend. Network Appliance STRONGLY recommends that all customers who use CIFS deploy an antivirus server. 16

Information on network-based NDMP tape backups is found in the Data Protection Tape Backup and Recovery Guide. In particular the following sections focus on security relevant features: Chapter 5: Using NDMP Services. Managing NDMP security features. Specifying the NDMP version. 2.2 User Guidance For individual end users accessing data stored on a NetApp storage system running Data ONTAP, the security configuration options are quite limited because most of the security features and options are controlled by system administrators. In fact a user accessing data within an iscsi or FCP LUN has no ability to modify or configure ANY security controls on the NetApp storage system. When accessing files via NFS, most users will be the owner of one or more files or directories. Users may only manage security on files or directories that they own, and only if the NFS filesystem they are accessing is located in a volume or qtree with the "unix" or "mixed" security style. Managing security on a file or directory is performed using the unix "chmod" and "chown" commands. Users and administrators should consult the documentation for their Unix operating system for details on how to use these commands or their equivalents, as the specific syntax and operation can vary between platforms. Users may find that the "chown" command does not function (unless they are logged in as the "root" user) if the Data ONTAP administrator has set the "wafl.root_only_chown" option; this is strongly recommended. When accessing files via CIFS, most users will be the owner of one or more files or directories. Users may only manage security on files or directories that they own, and only if the CIFS filesystem they are accessing is located in a volume or qtree with the "ntfs" or "mixed" security style. Managing security on a file or directory is performed using the procedures in the "Changing and displaying a file-level ACL" section of chapter 3 and "Changing UNIX permissions and DOS attributes from Windows" section of chapter 7 in the File Access Management Guide. Regardless of the methods individual users use to access and manage files stored on the NetApp storage system, one must remember an external server in the environment, such as a Kerberos, LDAP, or Microsoft Active Directory server, often performs the user authentication or authorization. While it is up to the administrators to keep these servers secure, users must manage their passwords in accordance with local password policies to prevent security incidents. 17 www.netapp.com 2006 Network Appliance, Inc. All rights reserved. Specifications subject to change without notice. NetApp, the Network Appliance logo, DataFabric, FAServer, FilerView, NetCache, NearStore, SecureShare, SnapManager, SnapMirror, SnapRestore, SpinCluster, SpinFS, SpinHA, SpinMove, SpinServer, and WAFL are registered trademarks and Network Appliance, ApplianceWatch, BareMetal, Camera-to-Viewer, ContentDirector, ContentFabric, Data ONTAP, EdgeFiler, HyperSAN, InfoFabric, MultiStore, NetApp Availability Assurance, NetApp ProTech Expert, NOW, NOW NetApp on the Web, RoboCache, RoboFiler, SecureAdmin, Serving Data by Design, Smart SAN, SnapCache, SnapCopy, SnapDirector, SnapDrive,SnapFilter,SnapMigrator, Snapshot, SnapSuite, SnapVault, SohoCache, SohoFiler, SpinMirror, SpinShot, SpinStor, The evolution of storage, Vfiler, VFM, Virtual File Manager, and Web Filer are trademarks of Network Appliance, Inc. in the U.S. and other countries. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such.