CloudLink Center Administration Guide for SecureVM 3.2



Similar documents
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Installing and Configuring vcloud Connector

User's Guide. Product Version: Publication Date: 7/25/2011

Copyright 2012 Trend Micro Incorporated. All rights reserved.

RealPresence Platform Director

F-Secure Messaging Security Gateway. Deployment Guide

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. August 2014 Phone: Publication: , Rev. C

Networking Best Practices Guide. Version 6.5

CTERA Agent for Linux

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Installing and Configuring vcloud Connector

NETWORK PRINT MONITOR User Guide

Copyright 2013 Trend Micro Incorporated. All rights reserved.


vcenter Support Assistant User's Guide

WhatsUp Gold v16.3 Installation and Configuration Guide

CTERA Agent for Mac OS-X

VMware vcenter Log Insight Administration Guide

Installing and Using the vnios Trial

Installing, Uninstalling, and Upgrading Service Monitor

Deployment and Configuration Guide

RSA Authentication Manager 7.1 Basic Exercises

Secure IIS Web Server with SSL

VMware Mirage Web Manager Guide

IBM Client Security Solutions. Client Security User's Guide

Managing Multi-Hypervisor Environments with vcenter Server

Offline Data Transfer to VMWare vcloud Hybrid Service

Eucalyptus User Console Guide

EMC Data Domain Management Center

Installing and Configuring vcenter Support Assistant

VMware Identity Manager Connector Installation and Configuration

NMS300 Network Management System

IIS, FTP Server and Windows


Polycom RealPresence Resource Manager System Getting Started Guide

HP A-IMC Firewall Manager

CTERA Agent for Mac OS-X

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3

Studio 5.0 User s Guide

NETWRIX EVENT LOG MANAGER

Veeam Backup Enterprise Manager. Version 7.0

Avalanche Remote Control User Guide. Version 4.1.3

vsphere Replication for Disaster Recovery to Cloud

VMware/Hyper-V Backup Plug-in User Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Content Filtering Client Policy & Reporting Administrator s Guide

EMC ENCRYPTION AS A SERVICE

VMware vcenter Operations Standard Installation and Administration Guide

Managing Software and Configurations

Active Directory Self-Service FAQ

Administrators Help Manual

Cisco Prime Collaboration Deployment Troubleshooting

WhatsUp Gold v16.2 Installation and Configuration Guide

Installation & Configuration Guide

vsphere Host Profiles

Chapter 8 Router and Network Management

Citrix XenServer Workload Balancing Quick Start. Published February Edition

WhatsUp Gold v16.1 Installation and Configuration Guide

Diagnostic Manager. User Guide. Publication Date: September 04, 2015

XenClient Enterprise Synchronizer Installation Guide

CA XOsoft Replication for Windows

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

Sophos Mobile Control SaaS startup guide. Product version: 6

Interworks. Interworks Cloud Platform Installation Guide

Server Installation Guide ZENworks Patch Management 6.4 SP2

vsphere Replication for Disaster Recovery to Cloud

User Management Guide

SafeGuard Enterprise Web Helpdesk

SevOne NMS Download Installation and Implementation Guide

HP IMC Firewall Manager

Configuring Sponsor Authentication

VMware vcenter Support Assistant 5.1.1

Virtual Managment Appliance Setup Guide

NovaBACKUP. Storage Server. NovaStor / May 2011

Virtual Web Appliance Setup Guide

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Implementation Guide for EMC for VSPEX Private Cloud Environments. CloudLink Solution Architect Team

Table of Contents. Welcome Login Password Assistance Self Registration Secure Mail Compose Drafts...

Nasuni Management Console Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud

Barracuda Link Balancer Administrator s Guide

Basic System Administration ESX Server and Virtual Center 2.0.1

Lenovo Online Data Backup User Guide Version

Trend Micro Encryption Gateway 5

Backup & Disaster Recovery Appliance User Guide

Fus - Exchange ControlPanel Admin Guide Feb V1.0. Exchange ControlPanel Administration Guide

StorSimple Appliance Quick Start Guide

EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server Version 1

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

VRC 7900/8900 Avalanche Enabler User s Manual

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

Remote Control Tivoli Endpoint Manager - TRC User's Guide

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

vcloud Director User's Guide

File Management Utility User Guide

Managing Identities and Admin Access

Transcription:

CloudLink Center Administration Guide for SecureVM 3.2 November 2014

THIS DOCUMENT CONTAINS CONFIDENTIAL AND TRADE SECRET INFORMATION OF CLOUDLINK TECHNOLOGIES AND RECEIPT OR POSSESSION DOES NOT CONVEY ANY RIGHTS TO REPRODUCE OR DISCLOSE ITS CONTENTS, OR TO MANUFACTURE, USE, OR SELL ANYTHING THAT IT MAY DESCRIBE, REPRODUCE, DISCLOSURE, OR USE IN WHOLE OR IN PART WITHOUT THE SPECIFIC WRITTEN AUTHORIZATION OF CLOUDLINK IS STRICTLY FORBIDDEN. The information furnished herein is believed to be accurate and reliable to the best of our knowledge. However, CloudLink Technologies assumes no responsibility for its use, or for any infringements of patents or other rights of third parties resulting from its use. CloudLink Technologies reserves the right to, without notice, modify all or part of this document and/or change product features or specifications and shall not be responsible for any loss, cost, or damage, including consequential damage, caused by reliance on these materials. If you are in any doubt as to whether this is the correct version of the manual for a particular release, contact CloudLink Technologies. Trademarks CloudLink is a registered trademark of CloudLink Technologies. All other brands or product names mentioned herein are for identification purposed only and may be trademarks and/or registered trademarks of their respective companies. Copyright 2014 All Rights Reserved. Document version 1.00 CloudLink Technologies 2680 Queensview Drive, Suite 150 Ottawa, Ontario, K2B 8J9, Canada Tel: +1 (613) 224-5995 Fax: +1 (613) 224-5410 Support Inquiries (866) 356-4060 support@cloudlinktech.com General Inquiries info@cloudlinktech.com Sales Inquiries sales@cloudlinktech.com

Contents Chapter 1: Introduction... 6 Audience... 7 Typographical Conventions... 7 Chapter 2: Getting Started... 8 Connecting to CloudLink over the Web... 8 Getting Help... 9 Customizing CloudLink Center Panel Views... 9 EULA and Ancillary Software... 10 Logging Out from a CloudLink Center Session... 10 Chapter 3: CloudLink Center... 11 Managing User Accounts... 11 User Accounts... 11 Verifying Your Access Role for the Current Session... 12 Viewing Current User Accounts... 13 Adding User Accounts... 13 Changing Local User Account Passwords... 14 Configuring an Active Directory Domain for User Accounts... 15 Configuring CloudLink Center Session Timeout... 16 Configuring a Domain Name Server... 17 Configuring Network Time Protocol Servers... 18 Managing SecureVM Licenses... 19 Uploading Licenses... 19 Assigning Licenses... 20 Importing a Signed CA Certificate... 21 Managing Encryption Keystores... 23 Manage Encryption Keys Using the Local Keystore... 24 Display the Current Location of the Encryption Keystore... 25 Configure Microsoft Active Directory as the Keystore... 25 Configure Amazon S3 as the Keystore... 27 Configure RSA DPM as the Keystore... 28 Change Encryption Keystores... 30 CloudLink Center Administration Guide for SecureVM 3.2 3

Managing Secure VMs... 30 View Registered VMs... 30 About VM Statuses... 31 Refresh a Linux VM s Mounted Devices... 32 Filter the List of VMs... 32 View Valid IP Addresses for VMs... 33 Define Valid IPs for VMs... 33 Accept or Reject a VM with the Pending Status... 34 Encrypt a VM s Volumes... 35 Decrypt a VM s Volumes... 36 Monitor the Real-time Progress of Encryption and Decryption Processes... 39 Block a VM... 40 Remove a VM... 40 Change a Windows VM s Volume Encryption Policy... 42 Change the CloudLink Center IP Address... 42 Backup and Restore SecureVM Configuration Information... 43 Create and Manage a CloudLink Center Cluster... 44 Viewing Logs and Events... 48 Viewing the CloudLink Actions Log... 49 Viewing the CloudLink Alarms Log... 50 Viewing the CloudLink Events Log... 50 Viewing the CloudLink Security Events Log... 51 Configuring Syslog... 52 Configuring a Syslog Logger... 52 Viewing Syslog Output... 53 Configuring SNMP... 53 Viewing SNMP Configuration... 54 Creating a New Community String... 55 Deleting a Community String... 55 Viewing SNMP Trap Destinations... 56 Creating a new SNMP Trap Destination... 56 Deleting an SNMP Trap Destination... 57 Downloading CloudLink MIBs... 57 Glossary... 59 Appendix A: Configuring Microsoft Active Directory as the Keystore... 61 Appendix B: Configuring RSA Data Protection Manager as the Keystore... 63 CloudLink Center Administration Guide for SecureVM 3.2 4

Appendix C: SVM Commands... 64 Command Actions... 64 Command Options... 65 Command Variables... 65 CloudLink Center Administration Guide for SecureVM 3.2 5

Chapter 1: Introduction Cloud computing offers significant benefits for deployment flexibility, infrastructure scalability, and cost-effective use of IT resources. It makes sense to take advantage of these benefits and deploy enterprise workloads in the cloud. However, cloud computing is based on a shared, multi-tenant compute, network and storage architecture where traditional security controls are not sufficient and data owners are responsible for securing sensitive data residing in the cloud to address privacy, regulatory compliance, and data remanence (data that may remain in the cloud after you re no longer using it) requirements. CloudLink SecureVM secures sensitive information within virtual machines (VMs) across both public and private clouds. This solution provides boot partition (sometimes referred to as the boot volume in Windows environments) and additional disk encryption with pre-startup authorization for virtual machines hosted in the cloud by using native operating system encryption features: Microsoft BitLocker for Windows and ecryptfs for Linux. BitLocker and ecryptfs are proven and high performance volume encryption solutions widely implemented for physical machines. However, customers have not been able to use these solutions in the cloud. In the cloud, BitLocker cannot be used to encrypt the boot partition and ecryptfs alone cannot encrypt the boot partition. SecureVM is designed to solve this problem. SecureVM enables BitLocker and ecryptfs to be used in a multi-tenant cloud environment to encrypt the virtual machine boot partition and additional disks, and protect the integrity of the virtual machine itself against unauthorized modifications. SecureVM encrypts the VMs boot partition and disks with unique keys that are under the control of enterprise security administrator. No cloud administrators or other tenants on the cloud have access to the keys. Securing the VM also lets you define the security policy that must be adhered to in order for passing the pre-startup authentication to start a VM, including verification of the integrity of the VM. This offers protection against malicious tampering. SecureVM ensures that only trusted and verified VMs have the ability to run and access sensitive data residing in the cloud. As part of the SecureVM solution, CloudLink Center defines the pre-startup authentication policy, performs pre-startup authentication, and monitors all SecureVM Agents, events and logs. CloudLink Center Administration Guide for SecureVM 3.2 6

Audience This guide provides a detailed description of the CloudLink Center management tool. This guide is intended for users of virtualized infrastructure and cloud services. Typographical Conventions This guide uses the following typographical conventions. Convention Bold Used for User interface elements such as menus, tabs, and boxes, as well as command options. For example: Click the Administration tab. Italics Values. For example Type the server address (clc_address). CloudLink Center Administration Guide for SecureVM 3.2 7

Chapter 2: Getting Started Before you can use CloudLink Center to manage SecureVM, you must deploy CloudLink SecureVM into your enterprise virtualization infrastructure or into the public cloud. For deployment information, see the CloudLink SecureVM Deployment Guide. You access the CloudLink Center management application with a web browser (see Connecting to CloudLink Center over the Web ). Note: CloudLink Center uses a self-signed certificate by default. You can import a certificate issued by a certification authority. Connecting to CloudLink over the Web Most management tasks are performed from CloudLink Center, which requires a web browser with JavaScript enabled. 1. In your web browser, type the URL of CloudLink Center in the format: https://clc_address:8443 where clc_address is an accessible link interface IP. When you connect to CloudLink Center, the CloudLink Center home page is displayed, as shown here: CloudLink Center Administration Guide for SecureVM 3.2 8

2. Enter a user name and password. Use the default user name secadmin and the default password clsecadmin to access the CloudLink Center. Note: If you re deploying from the AWS Marketplace, enter the AWS instance ID of the CloudLink Center instance as the default password. Warning: For security purposes, you should change the default secadmin password to prevent unauthorized access. For more information, see Changing Local User Account Passwords. After the credentials are validated, the main CloudLink Center window is displayed. Getting Help CloudLink documentation is available as PDFs from CloudLink. In addition to this Administration Guide, the following documents are available: CloudLink SecureVM Deployment Guide CloudLink SecureVM Release Notes For customer support, call us at (866) 356-4060 or email us at support@cloudlinktech.com. Customizing CloudLink Center Panel Views You can define the columns to be displayed in each panel and specify ascending or descending order for the column rows. to customize a column 1. Access a panel, such as the User Accounts panel. 2. To display the drop-down icon, move the mouse pointer over the rightmost area of a column heading in the panel. CloudLink Center Administration Guide for SecureVM 3.2 9

3. Click the icon to display the column options. From the menu items, select Sort Ascending or Sort Descending to set the order of the column items, and select the columns to display or hide. For example, to display the User name list in ascending order select Sort Ascending, and to hide the Built-in column uncheck the Built-in checkbox. The results are as follows: A triangle appears in the User name column that allows you to resort the column contents by clicking the column heading. Note: The settings only apply to the current CloudLink Center session. EULA and Ancillary Software The End User License Agreement (EULA) and the list of ancillary software distributed with CloudLink Center is available under the System tab of the CloudLink Center. Logging Out from a CloudLink Center Session To logout from a CloudLink Center session, click on Welcome at the top corner of the CloudLink Center main page and select Logout. The session is terminated and the CloudLink Center login page is displayed. CloudLink Center Administration Guide for SecureVM 3.2 10

Chapter 3: CloudLink Center After deployment, the CloudLink environment is managed with the CloudLink Center web application accessible via a HTTPS session. Managing User Accounts CloudLink Center defines three user roles: secadmin, admin, and observer. The default user credentials for CloudLink Center are as follows: User name: secadmin Password: clsecadmin Note: If you re deploying from the AWS Marketplace, enter the AWS instance ID of the CloudLink Center instance as the default password. The secadmin user has full access to all CloudLink Center functionality including user account management. WARNING: For security purposes, you should change the default secadmin password to prevent unauthorized access. For more information, see Changing Local User Account Passwords. User Accounts Each person who needs to work with CloudLink must have a user account in CloudLink Center. The access role of a CloudLink Center user account defines what functions the user is permitted to perform in the CloudLink system. You can create two types of CloudLink Center user accounts: Local accounts: These user accounts exist in and are applicable only to the CloudLink system. Domain accounts: Rather than creating users specifically for your CloudLink needs, you can reuse existing user accounts in your organization s Microsoft Active Directory (AD) domain and assign those accounts the appropriate CloudLink Center access role. Note: Before you can add Domain accounts, you must configure an Active Directory Domain. For more information, see Configuring an Active Directory Domain for User Accounts. CloudLink Center Administration Guide for SecureVM 3.2 11

User account parameters are as follows: User Name: Name to identify the user in the system. Access Role: The access roles are secadmin, admin, and observer. The secadmin user has full access to all CloudLink Center functionality, including secure storage management and keystore configuration. This user can create user accounts in CloudLink Center and change passwords for users. The secadmin user is the only user who is authorized to see the Security Events log and results of Security Audit tests. The admin user has full access to all CloudLink Center functionality, except secure storage management and keystore configuration. The admin user can not see the Security Events log and results of Security Audit tests. This user can change the passwords for admin and observer users. The observer user can monitor statistics on the CloudLink Center and view SLA test results. User Type: The options are local and domain. If you select domain, the user will be able to reuse the password from the domain user account to log on to CloudLink Center. If you select local, the user must enter a password to access CloudLink Center. Verifying Your Access Role for the Current Session To verify your access role for the current CloudLink Center session, note the current session user name in the top right corner of the CloudLink Center window: Follow the instructions provided in Viewing Current User Accounts and correlate the current session user name with the user account Access Role in the User Accounts panel. For this example, user randall has the admin access role as part of a local account. CloudLink Center Administration Guide for SecureVM 3.2 12

Viewing Current User Accounts You can view user accounts in the User Accounts panel. The Built-in column displays yes for the default user account secadmin. 1. From the Topology Tree, select CloudLink Center. 2. On the Administration tab, in the Options panel, click User Accounts. Adding User Accounts 1. Log in as a secadmin or admin user. 2. From the Topology Tree, select CloudLink Center. 3. On the Administration tab, in the Options panel, click User Accounts. 4. From the Add User panel, select a user type from the User Type list (see User Accounts ). 5. Type a user name. If the user type is domain, type the exact user name from the domain user account. If the specified user name is not found in the Active Directory, the system displays an error message. For information about Active Directory domains, see Configuring an Active Directory Domain for User Accounts. 6. From the Access Role list, select a role for the user (see User Accounts ). 7. Click Add to add a user to the User Accounts panel. CloudLink Center Administration Guide for SecureVM 3.2 13

8. For local user types, enter a password for the user. The password must include at least six characters. Changing Local User Account Passwords As a secadmin user, you can change the CloudLink Center password of all local users without entering the current user account password. As an admin user, you must enter the current local user password before changing the password of an admin or observer user. Observer account users cannot change their passwords. 1. Log in as a secadmin or admin user. 2. From the Topology Tree, select CloudLink Center. 3. On the Administration tab, in the Options panel, click User Accounts. When logged in as an admin user, only the admin and observer accounts are visible from the User Accounts panel. 4. In the User name list, right-click a user account and click Change password. Here, you can see the options for changing a secadmin user password: CloudLink Center Administration Guide for SecureVM 3.2 14

Here, you can see the options for changing an admin user password: 5. In the Change password window, type the current password if required and then type and confirm the new password. 6. Click OK. Configuring an Active Directory Domain for User Accounts Rather than creating users specifically for your CloudLink needs, you can reuse existing user accounts in your organization s Microsoft Active Directory (AD) domain and assign those accounts the appropriate CloudLink Center access roles. 1. Log in as a secadmin or admin user. 2. From the Topology Tree, select CloudLink Center. 3. On the Administration tab, in the Options panel, click AD Domain. 4. In the Controller Configuration panel, specify the Active Directory parameters: Host: The Active Directory host IP address (the Active Directory host is a Windows Server where the Active Directory is configured). Secondary Host: The Active Directory host IP address available for redundancy. Domain: User: Password: The domain name configured on the Active Directory host (for example, acme.com). A bind user configured on the Active Directory host with administrator privileges. The password configured for the bind user. CloudLink Center Administration Guide for SecureVM 3.2 15

5. Click Apply to use the configured Active Directory user names and passwords for CloudLink Center. 6. Add users from Active Directory (see Adding User Accounts ) to allow them to log into CloudLink Center. The Domain status is Inaccessible (in red text) if the Active Directory host cannot be reached because of a network problem or there is a problem authenticating the configured user. While the Active Directory is inaccessible, all domain login attempts are disabled. Check the Action logs to determine why the domain is inaccessible. For example: If Active Directory is inaccessible, it may take a few seconds to redisplay the AD Domain table. Configuring CloudLink Center Session Timeout CloudLink Center can be configured to close user sessions after a specified period of inactivity. If no operations are performed by the user for the period specified, the user is logged out and the login page is displayed. Actions do not affect the CloudLink system state, such as switching CloudLink Center tabs, do not trigger a reset of the session countdown timer. 1. Log in as a secadmin or admin user. 2. From the Topology Tree, select CloudLink Center. 3. On the Administration tab, in the Options panel, click Session. 4. Enter a value in minutes from 0 to 60 for Session timeout, where 0 disables the session timeout feature. 5. Click Apply. CloudLink Center Administration Guide for SecureVM 3.2 16

Configuring a Domain Name Server CloudLink Center may be configured to resolve hostnames using a Domain Name Server (DNS). CloudLink must be configured with a DNS if you wish to resolve vcenter or NTP server hostnames. This section shows you how to add and delete a DNS from CloudLink Center. to add a DNS 1. Log in as a secadmin or admin user. 2. From the Topology Tree, select CloudLink Center. 3. Click the Administration tab. 4. Click DNS. 5. Enter the IP address of the DNS in the IP address field and click Add. to delete a DNS server 1. Log in as a secadmin or admin user. 2. From the Topology Tree, select CloudLink Center. 3. Click the Administration tab. 4. Click DNS. 5. In the DNS Servers list, right-click the DNS you want to delete. 6. Click Delete. CloudLink Center Administration Guide for SecureVM 3.2 17

Configuring Network Time Protocol Servers You can synchronize CloudLink Center with a time of day obtained from Network Time Protocol (NTP) servers. By default, CloudLink is configured with four NTP servers. If you are planning to use a hostname for the NTP server, ensure that you have configured at least one DNS server first (see Configuring a Domain Name Server ). You can add and delete NTP servers. to add a NTP Server 1. Log in as a secadmin or admin user. 2. From the Topology Tree, select CloudLink Center. 3. On the System tab, in the Options panel, click System Time. 4. In the Configuration panel, type the IP address or hostname of the NTP server in the NTP Server field and click Add. to delete a NTP server 1. Log in as a secadmin or admin user. 2. From the Topology Tree, select CloudLink Center. 3. On the System tab, in the Options panel, click System Time. 4. In the NTP Servers list, right-click the NTP server. 5. Click Delete. CloudLink Center Administration Guide for SecureVM 3.2 18

Managing SecureVM Licenses SecureVM license files determine the number of VMs that your organization can manage using CloudLink Center and the duration of the license. For example, your license can identify you either by domain or customer ID, and allow you to run 10 VMs in CloudLink Center for 120 days. If your license uses a domain value to identify you, all licenses installed on CloudLink Center must contain the same domain value. Keep the following in mind when determining the license options you require: When a new VM is registered, CloudLink Center checks the number of VMs allowed by the remaining active licenses. The current number of VMs registered must be less than the number allowed by the active licenses. If not, the registration is rejected and an event is generated. For information about registering VMs, see the CloudLink SecureVM Deployment Guide. When a license expires, CloudLink Center rejects new VM registrations if the current number of VMs registered equals the number allowed by the active licenses. No other actions are taken. Licensing involves the following tasks: uploading a license file to CloudLink Center (see Uploading Licenses ) assigning the license to CloudLink Center (see Assigning Licenses ) Uploading Licenses You upload license files to make licenses available to CloudLink Center. Uploading a license does not activate it. You must assign the license (see Assigning Licenses ) before it goes into effect. For convenience, you may want to upload licenses when you obtain then, but wait until they are needed to assign them. 1. Log in as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the System tab, in the Options panel, select SecureVM License. 4. From the License Registration panel, click the browse button to access the File Upload dialog. For example: CloudLink Center Administration Guide for SecureVM 3.2 19

5. From the File Upload dialog, locate and select a license file, and click OK. 6. Click the Upload button to upload and display the license file in the License Pool panel. The license appears under the Unassigned heading. The license information for new licenses includes the Type, Platform, Limit (maximum number of VMs), and Duration in days. The Start Date and End Date are not displayed because the license has not been assigned. Assigning Licenses You can assign a license that s been uploaded to CloudLink Center (see Uploading Licenses ). When you assign a license, CloudLink Center calculates the license expiry date. Using the current date as the start date, the expiry (or end date) is determined based on the license duration. Each day, CloudLink Center checks whether any active license expires in the next 30 or 60 days. For licenses expiring in the next: 30 days, CloudLink Center creates a "non-compliance warning" event 60 days a "non-compliance reminder" event is created. These events are created for each separate license that has been uploaded. Events are generated regardless of whether the deployment has enough non-expired licenses to remain in compliance. 1. Log in to CloudLink Center as a secadmin or admin user. 2. From the Topology Tree, select CloudLink Center. 3. Click the SecureVM tab. 4. In the Options panel, select License. 5. From the License Assignment panel, select a license from the Available Licenses list. Only valid licenses are displayed in the list. CloudLink Center Administration Guide for SecureVM 3.2 20

6. Click the calendar icon, and select a start date for the storage license (past, present, or future). The selected date is reflected in the Start Date field as YYYY-MM-DD. 7. Click Assign. 8. Observe the graph in the License Usage panel. For each assigned license, the graph heading displays the number of VMs and the license expiry date. The graph depicts the number of VMs and the valid dates for the license. Moving the mouse pointer over the starting point of a graph line displays the start date and moving the mouse pointer over the end point of a graph line displays the end date. Importing a Signed CA Certificate By default, the CloudLink Center uses a self-signed certificate. When connecting to CloudLink Center, the web browser may display several security warnings. These warnings are displayed because self-signed certificates do not have the same level of trust as certificates issued and signed by a trusted certification authority (CA). To stop these warnings from being displayed, you can obtain a certificate for CloudLink Center that has been signed by a trusted CA. You then import this certificate for CloudLink Center. Subsequent web browser connections to CloudLink Center will not display security warnings. CloudLink Center Administration Guide for SecureVM 3.2 21

CloudLink supports two certificate formats: Privacy-Enhanced Electronic Mail format. Certificates using this format are provided in files with the filename extension.pem. Along with the certificate file, the CA provides you with a private key file. This private key is required to access the certificate in the.pem file. PKCS#12 format. Certificates using this format are provided in files with the filename extension.p12. Along with the certificate file, the CA provides you with a password that s required to access the certificate in the.p12 file via its private key. You can view information about the current certificate. This information includes the certificate subject, expiration date and SHA1 fingerprint. 1. Log in as a secadmin or admin user. 2. From the Topology Tree, select CloudLink Center. 3. On the Certificates tab, in the Options panel, click Web SSL. 4. From the Configuration panel, select a certificate format from the Certificate Format list. 5. From the Certificate Source box, click the browse button to access the File Upload dialog. 6. From the File Upload dialog, access the location where the certificate is stored, select the certificate file, and click Open. CloudLink Center Administration Guide for SecureVM 3.2 22

7. Do one of the following: For a certificate using the.pem format, from the Key Source box, click the browse button to access the File Upload dialog. Locate the private key file and click Open. For a certificate using the.p12 certificate format, in the Password box, type the password provided with the certificate file. 8. Click Upload. 9. Verify the Subject, End Date, and SHA1 Fingerprint information to ensure this is the certificate you want to use. 10. Click Apply. 11. Click OK to confirm that the web server will restart and the connection will be terminated. Managing Encryption Keystores CloudLink Center can provide one or more encrypted volumes. The volumes are encrypted with a default encryption key. You must change the default encryption key before using the storage. You can trigger automatic encryption key changes based on a time interval. CloudLink Center Administration Guide for SecureVM 3.2 23

CloudLink provides several options to store encryption keys (keystore): Local (the default keystore) Active Directory Amazon S3 RSA Data Protection Manager (DPM) Note: Initially, the storage status shown in the CloudLink Center is Unlocked, and the key name is shown as Undefined, which means that the storage was opened using the default encryption key. If you re creating a CloudLink Center cluster, you must use the local database. After creating the cluster, you can change to an external keystore. All encryption key operations are available from CloudLink Center only and require the secadmin user account. This section shows you how to: Manage Encryption Keys Using the Local Keystore Display the Current Location of the Encryption Keystore Configure Microsoft Active Directory as the Keystore Configure Amazon S3 as the Keystore Configure RSA DPM as the Keystore Change Encryption Keystores Manage Encryption Keys Using the Local Keystore By default, the Local keystore is used and all encryption keys are stored in CloudLink Center. A secadmin user can save and restore the keys using the Export Keys and Import Keys options available from the CloudLink Center Security, Key Store panel. CloudLink Center Administration Guide for SecureVM 3.2 24

To retain access to encrypted data in the event of an unrecoverable failure of CloudLink Center when using Local keystore, you should export the encryption keys on a regular basis and store them in a secure environment. All keys are exported as a set into a single file. The exported keys allow you to access the encrypted data from another CloudLink Center. Display the Current Location of the Encryption Keystore 1. Log in as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. Click the Key Store tab. Configure Microsoft Active Directory as the Keystore To use Microsoft Active Directory for the CloudLink keystore, you must deploy a Windows server so that it is reachable by CloudLink Center. For information on configuring an Active Directory on a Windows server, see Appendix A: Configuring Microsoft Active Directory as the Keystore. Before configuring Active Directory as the keystore, you must configure the DNS server (see Configuring a Domain Name Server ). Note: All encryption key and storage management operations require the secadmin user account. The storage state and storage statistics can also be viewed by admin and observer users. 1. Configure Active Directory. 2. Log in as a secadmin user. 3. From the Topology Tree, select CloudLink Center. 4. On the Key Store tab, in the Options panel, click Active Directory. CloudLink Center Administration Guide for SecureVM 3.2 25

5. In the Active Directory Configuration panel, specify the Active Directory parameters: Host: The name of the Active Directory in FQDN format. Port The TCP port number configured on the Active Directory host (for example, 389). Base DN: User: Password: Key Store Password: The base domain name for the security group configured on the Active Directory host. The login name for the bind user in the security group. The password configured for the bind user. The value used to encrypt the keys stored on Active Directory. You can type any password, but ensure that you record it in another location. This password is required to recover keys in the event of CloudLink Center failure. When configuring the keystore for a CloudLink Center cluster, ensure that you specify the same key password for both the master and slave server. Note: The Port, Base DN, User and Password parameters are part of the Active Directory configuration of Windows Server. 6. Click Apply to use the configured Active Directory for storage of CloudLink encryption keys. The keystore status is Inaccessible in red if the Active Directory host cannot be reached because of a network problem or if there is a problem authenticating the configured user. Check the Action logs to determine why the keystore is inaccessible. If the storage was unlocked when Active Directory became inaccessible, it will stay unlocked. If after the AD became inaccessible, the vnode which hosts the storage was restarted, the storage would become locked. The storage will unlock when Active Directory becomes available. CloudLink Center Administration Guide for SecureVM 3.2 26

Note: Do not lock the storage while the keystore is inaccessible. The storage will not be available for use until the keystore becomes accessible. Configure Amazon S3 as the Keystore To use Amazon S3 for the CloudLink keystore, you must have an Amazon Web Services (AWS) account. As well, the Amazon S3 server must be reachable by CloudLink instance. Before configuring Amazon S3 as the keystore, you must configure the public DNS server (see Configuring a Domain Name Server ). The configured DNS server must be able to resolve public internet addresses such as the Amazon public name for S3 services: http://aws-portal.amazon.com Note: All encryption key and storage management operations require the secadmin user account. The storage state and storage statistics can also be viewed by admin and observer users. 1. Verify that the Amazon S3 server is reachable from CloudLink Center via its network interface. 2. Log in to CloudLink Center. 3. On the Key Store tab, in the Options panel, click Amazon S3. 4. In the Amazon S3 Configuration panel, specify the Amazon S3 parameters: Access Key ID: Secret Access Key: Key Store Password: The Access Key ID associated with your AWS account. The Secret Access Key associated with your AWS account. The password you want to use to access the keystore. When configuring the keystore for a CloudLink Center cluster, ensure that you specify the same key password for both the master and slave server. CloudLink Center Administration Guide for SecureVM 3.2 27

For example: 5. Click Apply. The keystore status is Inaccessible (in red text) if the AWS host cannot be reached because of a network problem. Check the Action logs to determine why the keystore is inaccessible. If the storage was unlocked when the AWS host became inaccessible, it will stay unlocked. If after the AWS host became inaccessible, the CloudLink node which hosts the storage was restarted, the storage would become locked. The storage will unlock when the AWS host becomes available. Note: Do not lock the storage while the keystore is inaccessible. The storage will not be available for use until the keystore becomes accessible. Configure RSA DPM as the Keystore To use RSA DPM for the CloudLink keystore, you must deploy an RSA DPM server so that it is reachable by CloudLink Center. For information on configuring RSA DPM, see Appendix B: Configuring RSA Data Protection Manager. Note: All encryption key and storage management operations require the secadmin user account. The storage state and storage statistics can also be viewed by admin and observer users. 1. Verify that the RSA DPM server is reachable from CloudLink Center via its private LAN network interface. The supported RSA DPM versions are 3.2 and 3.5. 2. Verify that the client certificates have been created and uploaded to the RSA DPM server, and that they are accessible from CloudLink Center. If a security class for the RSA DPM client is not configured, see Appendix B: Configuring RSA Data Protection Manager. CloudLink Center Administration Guide for SecureVM 3.2 28

A VM can only register once with RSA DPM. To re-register, you must either change VM hostname or delete it from the RSA DPM server database. 3. Log in to CloudLink Center. 4. On the Key Store tab, in the Options panel, click RSA DPM. 5. In the RSA DPM Configuration panel, specify the RSA DPM parameters: Host: The RSA DPM host IP address. Port: The TCP port number configured on the RSA DPM host (default port is 443). Security Class Name: Trust Certificate: Client Certificate: Password: The name of the security class configured on the RSA DPM host for the RSA DPM client. The RSA DPM server certificate. The RSA DPM client certificate. The password used during the RSA DPM client certificate creation. For example: 6. Click Apply. The keystore status is Inaccessible in red if the RSA DPM host cannot be reached because of a network problem or if there is a problem authenticating the configured user. Check the Action logs to determine why the keystore is inaccessible. If the storage was unlocked when the host became inaccessible, it will stay unlocked. If after the host became inaccessible, the CloudLink node which hosts the storage was restarted, the storage would become locked. The storage will unlock when the host becomes available. CloudLink Center Administration Guide for SecureVM 3.2 29

Note: Do not lock the storage while the keystore is inaccessible. The storage will not be available for use until the keystore becomes accessible. Change Encryption Keystores You cannot switch directly from one external keystore to another external keystore. If you need to change keystores, you must export the encryption keys through the local keystore. When you switch from an external keystore to the local keystore, the encryption keys are preserved. You can then export the keys from the local keystore to the new external keystore. For information about exporting encryption keys from the local keystore, see Manage Encryption Keys Using the Local Keystore. Managing Secure VMs From CloudLink Center, you manage individual VMs on which SecureVM Agent has been deployed. For example, you can configure the IP addresses from which VMs can start automatically, decrypt volumes, and block individual VMs from starting up automatically. For information about deploying SecureVM Agent, see the CloudLink SecureVM Deployment Guide. Each VM registered with CloudLink Center is assigned a unique serial number that s stored in the CloudLink Center database. If a VM has more than one volume, CloudLink Center management operations (such as encrypting and removing) can be performed on individual volumes. View Registered VMs You can view a list of VMs registered with CloudLink Center. This list provides information about each VM, such as its host name, IP address, serial number (the unique identifier for the VM in the CloudLink Center database), platform, status (such as online or offline), and revision. CloudLink Center Administration Guide for SecureVM 3.2 30

You can view additional details for VMs in this list. In this example, you can see two VMs. In the expanded information for the VM with the host name WIN-3CQRQ5PKSNE, you can see that the encryption policy is All Data. 1. Log in as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the SecureVM tab, in the Options panel, click VMs. 4. If you want to see details for one or more VMs, click the + icon in the first column. About VM Statuses Each registered VM is assigned a status that you can view in CloudLink Center (see View Registered VMs ). The status of a VM determines the actions that you can perform, including encrypting volumes, decrypting volumes, accepting or rejecting startup, blocking startup, or removing a VM. Available actions depend on whether the VM is running Windows or Linux. Statuses include: Online The VM is registered and running. Offline The VM is registered, but is either not running or not reachable by CloudLink Center. Pending The VM is registered and running, but conditions exists that require manual intervention before it s allowed to complete its startup process. For more information, see Accept or Reject a VM with the Pending Status. CloudLink Center Administration Guide for SecureVM 3.2 31

Blocked An administrator has specified that the VM is not allowed to obtain its keys on startup. CloudLink Center will not release encryption keys to this VM until it is explicitly unblocked. Refresh a Linux VM s Mounted Devices If you add a new mounted device for a Linux VM, you should refresh the VM, such that the new device is added to CloudLink Center s VMs panel. Step From the Linux VM command line, type: svm reload [ v ] [ s ] For information about optional svm parameters, see Appendix C: SVM Command. Filter the List of VMs You can filter the list of VMs in the VMs panel to show a subset of VMs matching specific criteria. Filtering the list by status is convenient when you want to focus on only a subset of all VMs. You can filter by: status (see About VM Statuses ). volume encryption policy ( see the CloudLink SecureVM Deployment Guide) These filters can be used in combination. For example, you can filter the VMs list to show VMs with a status of Online and a volume encryption policy of All Data. 1. Log in as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the SecureVM tab, in the Options panel, click VMs. 4. Select the filters: From the Status list, select the status. From the Policy list, select the status. CloudLink Center Administration Guide for SecureVM 3.2 32

View Valid IP Addresses for VMs When a VM starts up, its IP address is checked against a list of valid IP addresses in CloudLink Center. If the IP address is identified as valid, the VM is allowed to start. CloudLink Center supports Internet Protocol v4 (IPV4) addresses only. You can view the list of valid IP addresses that have been defined in CloudLink Center. There is one circumstance in which Windows VMs can start if their IP address is not in this list. On initial startup following deployment of SecureVM Agent, the VM is allowed to go directly to the Online state. For information about defining valid IP addresses, see Define Valid IPs for VMs. 1. Log in as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the SecureVM tab, in the Options panel, click Configuration. Define Valid IPs for VMs You define the IP addresses for VMs that are pre-authorized to start up automatically. You can view the currently defined list of IP addresses in the Accepted IP list (see View Valid IP Addresses for VMs ). You can define IP addresses as: IP to specify a single IP address. CIDR to specify a network of IP addresses using Classless Inter-Domain Routing. IP Range to specify a range of consecutive IP addresses. CloudLink Center Administration Guide for SecureVM 3.2 33

In some cloud environments (for example, Microsoft Azure), the public IP address of a VM may change when it s shutdown and restarted. A new IP address is assigned from the same subnet as the previous address. Configuring IP addresses using ranges (instead of individual IP addresses) ensures that VMs will not be assigned the Pending state on startup. 1. Log in as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the SecureVM tab, in the Options panel, click Configuration. 4. In the Configuration panel, select the ACL type. 5. Do one of the following: For the IP ACL type, type the IP address. For the CIDR ACL type, type the CIDR. For the IP Range ACL type, type the first IP address in the Start IP box and the last IP address in the End IP box. 6. Click Add. Tip: To remove an IP address listed in the Accepted IP list, right-click the IP address and click Remove. Accept or Reject a VM with the Pending Status When a registered VM starts up, CloudLink Center may assign it a status of Pending. This status means that conditions exists that prevent CloudLink Center from releasing the encryption keys for the VM s volumes, which suspends the startup process. After a VM s volumes have been encrypted, CloudLink Center may assign a VM the Pending status when it detects one or more of the following conditions: The integrity value calculated for the VM has changed since the last startup process. A duplicate IP address exists for the VM. For example, another VM is online with a different serial number and the same IP address. The IP address of the VM has changed since the last startup process. The VM's IP address is not listed as valid in the Access Control List (see Define Valid IPs for VMs ). CloudLink Center Administration Guide for SecureVM 3.2 34

For VMs with the Pending status, you can view the reason for this status in the Details column of the VMs panel. This reason is intended to help you identify the underlying condition for the Pending status. As a one-time option, you can choose to manually accept or reject a VM with the Pending status. If you reject a VM, it s shut down automatically and its status in the VMs panel changes to Offline. The option you choose applies to the current startup process only. The next time a previously accepted or rejected VM starts up, it s put in the Pending state again if any reason for this state is detected. You must once again choose whether to accept or reject the VM. If no conditions exist for the Pending state (for example, the previous issue has been resolved), the VM s status is Online. If you don t accept or reject the VM, it remains in the Pending state for two hours and is then automatically shut down. At two-minute intervals during the two-hour timeframe, SecureVM checks whether the reason that caused the Pending state has been resolved. If so, the VM is allowed to continue its startup process. 1. Log in as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the SecureVM tab, in the Options panel, click VMs. 4. In the VMs panel, right-click the VM and do one of the following: Click Accept to allow the VM to complete its startup process. Click Reject to prevent the VM from completing its startup process. Click Yes. Encrypt a VM s Volumes You can encrypt a Windows or Linux VM s unencrypted boot partition. You can also encrypt a Windows VM s data disks or Linux VM s mounted devices on an individual basis. For example, when deploying SecureVM Agent to a Windows VM, you may have applied a volume encryption policy that encrypted only the boot partition. After deployment, you can encrypt the VM s data disks on an individual basis. After initiating encryption, you can monitor progress on the VM (see Monitor the Real-time Progress of Encryption and Decryption Processes ). You can also view progress in the VMs panel on the SecureVM tab of CloudLink Center (see View Registered VMs ). CloudLink Center Administration Guide for SecureVM 3.2 35

Encrypt a Boot Partition or Windows VM s Data Disk You can encrypt volumes in the Online state. 1. Log in as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the SecureVM tab, in the Options panel, click VMs. 4. In the VMs panel, expand the Windows VM to show its disks. 5. Right-click the disk and click Encrypt. 6. Click Yes. The status changes to Pending. 7. In the VMs panel, right-click the VM and click Accept. 8. Click Yes. Encrypt a Linux VM s Devices You encrypt a Linux VM s mounted or unmounted devices from the command line. If mounted, the command first unmounts the mount point If files are open, an error occurs and the encryption does not occur. If the encryption completes successfully, the device is mounted, regardless of whether it was mounted or unmounted prior to running the command. The command uses the following format: svm encrypt mount_point [device] [ v ] [ s ] The [device] parameter must be used when the device is not mounted and not listed in /etc/fstab. For information about svm parameters, see Appendix C: SVM Command. For example: svm encrypt /mnt/secure1 /dev/sdb1 Decrypt a VM s Volumes You can decrypt a Windows or Linux VM s encrypted boot partition. You can also decrypt a Windows VM s data disks or Linux VM s mounted devices on an individual basis. CloudLink Center Administration Guide for SecureVM 3.2 36

For example, before removing a VM that you no longer want to be under SecureVM control, you should decrypt the volumes if you want to continue using the VM. Otherwise, its volumes remain encrypted and therefore inaccessible. Decrypt a Windows VM s Volumes You can decrypt volumes (boot partition and data disks) for a Windows VM in the Online state. After initiating decryption, you can monitor progress on the VM (see Monitor the Real-time Progress of Encryption and Decryption Processes ). You can also view progress in the VMs panel on the SecureVM tab of CloudLink Center (see View Registered VMs ). 1. Log in as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the SecureVM tab, in the Options panel, click VMs. 4. In the VMs panel, expand the Windows VM to show its disks. 5. Right-click the disk and click Decrypt. 6. Click Yes. Decrypt a Linux VM s Boot Partition Decrypting a Linux VM s boot partition involves three tasks: copying the contents of the boot partition to a second disk. On the second disk, the contents are unencrypted. removing the SecureVM encryption software from the boot partition. copying the contents on the second disk back to the boot partition. 1. Back up all data. 2. Attach a second disk that s at least as large as the root disk. This disk should not contain any data as it will be overwritten with contents from the encrypted disk. Do not mount this disk. For Amazon Web Services and Microsoft Azure, the new disk is detected automatically. For VMware vsphere, you must reboot the VM to detect the new disk. CloudLink Center Administration Guide for SecureVM 3.2 37

3. From the command line, type the following: svm decrypt [device] [ v ] [ s ] where [device] is the disk attached in Step 2. For information about this command, see Appendix C: SVM Command. 4. When prompted to restart the VM, choose yes. 5. Wait until the VM is displayed in the VMs panel (SecureVM, VMs) with the Online status. Warning: The time required to complete this operation depends on the size of the boot disk and the environment type. 6. When CloudLink Center shows the boot partition is online and decrypted, you can safely detach the second disk. Decrypt a Linux VM s Mount Points You can decrypt both mounted and unmounted devices. 1. Back up all data. 2. Attach a target device that s at least as large as the encrypted mount point. This target should not contain any data as it will be overwritten with contents from the encrypted mount point. 3. Mount the target device. mount target_device target_mount_point 4. From the command line, type: rsync -axv --delete mount_point target_mount_point For example: rsync -axv --delete /mnt/disk/ /mnt/target_disk/ Important: The / at the end of the mount point that you re copying from (/mnt/disk/ in this example) is required. 5. From the command line, type: svm removemp mount_point [ v ] [ s ] For information about this command, see Appendix C: SVM Command. CloudLink Center Administration Guide for SecureVM 3.2 38

6. From the command line, type: rsync -axv --delete target_mount_point mount_point For example: rsync -axv --delete /mnt/target_disk/ /mnt/disk/ Important: The / at the end of the mount point from which you re copying data (/mnt/target_disk/ in this example) is required. Monitor the Real-time Progress of Encryption and Decryption Processes After initiating an encryption or decryption process on a Windows VM, you can monitor the progress in real-time on the VM, as described in this topic. You can also monitor the progress in the VMs panel on the SecureVM tab of CloudLink Center (see View Registered VMs ). After initiating an encryption process on Linux VM, the current encryption progress is shown in the VM console. You can also monitor progress in the VMs panel on the SecureVM tab of CloudLink Center (see View Registered VMs ). The progress of decryption processes is not available for Linux VMs. to monitor progress on a Windows VM 1. Click the CloudLink icon in the Windows taskbar. 2. Click the Encryption Status option to display the percentage of encryption or decryption that s complete. CloudLink Center Administration Guide for SecureVM 3.2 39

Block a VM Block a VM when you want to prevent it from starting up automatically. Windows VMs are shut down immediately, regardless of whether its volumes are encrypted or decrypted, or whether the IP address has been defined as valid (see Define Valid IPs for VMs ). The status of the VM in the VMs panel changes to Blocked. A VM remains in the Blocked status until you explicitly choose to unblock it. Once unblocked, a VM is assigned a status of Online, as long as no conditions exist that result in a Pending status. You can block a VM in the Online or Offline state. 1. Log in as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the SecureVM tab, in the Options panel, click VMs. 4. In the VMs panel, right-click the VM and click Block. 5. Click Yes. 6. In the VMs panel, right-click the VM and click Accept. 7. Click Yes. Tip: To unblock the volume, right-click the VM in the VMs panel and click Unblock. Remove a VM You remove a VM when you no longer want it registered with CloudLink Center. Typically, you remove a VM because: You no longer want to make use of the VM in the SecureVM environment. In this case, you want to decrypt any encrypted volumes and remove SecureVM Agent from the VM. For information, see Remove a VM from the SecureVM Environment. You want to release a SecureVM license. In this case, you want to de-register the VM from CloudLink Center. At some time in the future, you may re-register the VM. For information, see Release a SecureVM License. CloudLink Center Administration Guide for SecureVM 3.2 40

Remove a VM from the SecureVM Environment If you no longer want to make use of the VM in the SecureVM environment, you can remove it such that the VM is de-registered from CloudLink Center and SecureVM Agent is automatically uninstalled. Before removing a VM, it must have a status of Online. As well, you must decrypt the boot partition and any additional disks (Windows) or mounted devices (Linux) that you want to use after the VM has been de-registered from CloudLink Center as they will be inaccessible otherwise. 1. Log in as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the SecureVM tab, in the Options panel, click VMs. 4. In the VMs panel, verify that the VM you plan to remove is in the Online state. 5. Decrypt the boot partition and any additional disks or mounted devices. For information about decryption procedures, see Decrypt a VM s Volumes. 6. Wait for the decryption processes to complete. 7. In the VMs panel, right-click the VM and click Remove. 8. Click Yes. Release a SecureVM License If you want to temporarily remove a VM from CloudLink Center to release a SecureVM license, ensure it is in the Offline state. Once removed, the VM does not appear in the VMs panel. However, if the VM is restarted, it is listed in the VMs panel with a status of Pending. You must explicitly accept or reject the VM (see Accept or Reject a VM with the Pending Status ) within two hours or the VM is automatically shut down. 1. Shut down the VM. 2. Log in to CloudLink Center as a secadmin user. 3. From the Topology Tree, select CloudLink Center. 4. On the SecureVM tab, in the Options panel, click VMs. 5. In the VMs panel, right-click the VM and click Remove. 6. Click Yes. CloudLink Center Administration Guide for SecureVM 3.2 41

Change a Windows VM s Volume Encryption Policy You can change the volume encryption policy for Windows VMs. You selected the initial volume encryption policy during SecureVM Agent deployment. For information, see the CloudLink SecureVM Deployment Guide. For example, if the volume encryption policy applied during SecureVM Agent deployment was Boot and Manual Data, only the boot partition was encrypted. No data disks were encrypted during deployment and any data disks after deployment must be manually encrypted while the initial policy is in effect. You may want to change to the All Data policy so that data disks added to this VM are automatically encrypted. Changing the volume encryption policy does not affect the boot partition or any existing data disks. The new policy is applied when data disks are added to the VM. 1. Log in to CloudLink Center as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the SecureVM tab, in the Options panel, click VMs. 4. In the VMs panel, right-click the Windows VM and click Policy. 5. From the Encryption Policy list, select the new policy and click OK. 6. Check the Actions Log to confirm that the volume encryption policy was changed successfully. Change the CloudLink Center IP Address If you replace CloudLink Center, its IP address may change. You must update each SecureVM Agent with the new CloudLink Center IP address, which is used by SecureVM Agent to communicate with CloudLink Center. For VMs in the public cloud, this will be an external IP address. Alternatively, you can specify the FQDN if the DNS already has an entry for CloudLink Center. CloudLink Center Administration Guide for SecureVM 3.2 42

to change the IP address for CloudLink Center for a Windows VM 1. On a VM where SecureVM Agent is deployed, from a command prompt window, type regedit. 2. Browse to HKEY_LOCAL_MACHINE /Software / CloudLink Technologies Inc /SecureVM. 3. Change value of the Server key to the new IP address for CloudLink Center. 4. Save and close the registry. 5. Restart the SecureVM Service. to change the IP address for CloudLink Center for a Linux VM From a command prompt window, type: svm IPaddress [ v ] [ s ] For information about this command, see Appendix C: SVM Command. Backup and Restore SecureVM Configuration Information It s important to ensure you have a backup of the configuration information in CloudLink Center used to communicate with its VMs. If CloudLink Center fails, you restore this configuration information from a backup file to a new CloudLink Center. A backup file uses the following format for its file name: Securevm_1409149881880.bak A backup file does not include encryption keys or configuration information about CloudLink Center clusters. If you re using a local keystore, you must backup your encryption keys. For information, see Manage Encryption Keys Using the Local Keystore. to backup SecureVM configuration information 1. Log in to CloudLink Center as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the SecureVM tab, in the Options panel, click Backup/Restore. 4. In the Backup panel, click Download. 5. Follow the prompts to save the backup file. By default, the backup file is saved to your Downloads folder. 6. Move the backup file to a secure location where it will be accessible should CloudLink Center or its server fail. CloudLink Center Administration Guide for SecureVM 3.2 43

to restore from a SecureVM backup file 1. Log in to the new CloudLink Center as a secadmin user. 2. From the Topology Tree, select CloudLink Center. 3. On the SecureVM tab, in the Options panel, click Backup/Restore. 4. In the Restore panel, browse to the location of the backup file. 5. Double-click the.bak file you want to restore from. 6. Click Restore. 7. For each VM that was under the control of the previous CloudLink Center, configure the server address of the new CloudLink Center. For information, see Change the CloudLink Center IP Address. Create and Manage a CloudLink Center Cluster A CloudLink Center cluster provides for high availability in the event that one CloudLink Center server in the cluster becomes unavailable. For example, a server may become unavailable unexpectedly due to a connection issue. A server may also become unavailable during periods of planned maintenance, where a server is taken offline. A CloudLink Center cluster is comprised of two CloudLink Center servers, where one server (referred to as the slave) is joined to another server (referred to as the master). Configuration information stored by the master server is replicated on the slave, such that both servers contain the same critical configuration information. Information replicated on both servers includes: SecureVM licensing, volume encryption policies, user accounts, and the master key (if stored locally). Information in memory on the master server (such as pending encryption key requests) is not replicated on the slave server. In the event that the master becomes unavailable, the slave server becomes the master. The slave server assumes that the master is unavailable if the slave does not receive a heartbeat from the master. Signals are sent by the master at two-second intervals. Creating a CloudLink Center cluster involves the following tasks: Deploy and configure two CloudLink Center servers. The CloudLink Center server that you plan to use as the slave must be a clean install of CloudLInk Center. CloudLink Center Administration Guide for SecureVM 3.2 44

During deployment, the master key is stored on the local keystore for both servers. For information about the local keystore, see Manage Encryption Keys Using the Local Keystore. During creation of the cluster, the master key stored in the master server s local keystore automatically replicates to the slave server s local keystore. After the cluster has been created, you can change to an external keystore. The keystores for the master and slave servers must be identical. Then, configure both the master and slave servers to access their external keystores. For information about deploying and configuring CloudLink Center servers, see Chapter 3, Deploy and Configure CloudLink Center in the CloudLink SecureVM Deployment Guide. In CloudLink Center for the master server, generate a cluster passcode for the slave server (see Generate a Cluster Passcode ). In CloudLink Center for the slave server, provide the cluster passcode to join the slave server to the master (see Join the CloudLink Center Servers ). You can remove the CloudLink Center slave at any time (see Remove the Slave Server ). Generate a Cluster Passcode Before you can join the slave server to the master server, you must generate a cluster passcode in CloudLink Center for the master server. You will then provide this passcode when joining the servers (see Join the CloudLink Center Servers ). A cluster passcode is unique and corresponds to the particular CloudLink Center server instance that you re adding. You can choose the duration that the passcode is valid for. 1. From a web browser, access the CloudLink Center home page for the master server and log in as the secadmin user. To access the CloudLink Center home page, use the web address: https://master_clc_address:8443 For information about accessing CloudLink Center and logging in from the home page, see Connecting to CloudLink over the Web. 2. Click the Certificates tab. 3. From the Options panel, click Cluster Passcode. CloudLink Center Administration Guide for SecureVM 3.2 45

4. Type the common name for the CloudLink Center server that you want to join to the server that will be the master server. 5. From the Valid (minutes) list, select the duration that you want the cluster passcode to be valid for. 6. Click Add. The common name for this server is listed in the Cluster Passcode list, along with its cluster passcode and the time that the code will expire. 7. Record the cluster passcode so that you can provide it when joining the servers. Tip: To copy the code, double-click the value in the Passcode column of the Pending Cluster Members panel, select the value, and press CTRL-C. Join the CloudLink Center Servers After generating a cluster passcode on the master server (see Generate a Cluster Passcode ), you join the slave server with the master. To perform the join, you provide the: server address for the CloudLink Center server that will be the master server. You can use the hostname if you have configured the DNS server first. See Configuring a Domain Name Server. cluster passcode. 1. Access and log in to CloudLink Center for the slave server from a web browser. To access the CloudLink Center home page, use an URL in the following format: https://slave_clc_address:8443 For information about accessing CloudLink Center and logging in from the home page, see Connecting to CloudLink over the Web. 2. Click the SecureVM tab. CloudLink Center Administration Guide for SecureVM 3.2 46

3. On the Options panel, click Cluster. 4. In the Server box, type the IP address for the CloudLink Center server that will be the master. 5. In the Passcode box, type the cluster passcode for this slave server. 6. Click Connect. You can verify the servers and their current states (master or slave) in the Cluster Members panel (SecureVM, Options, Cluster): Remove the Slave Server You can remove the slave server from a CloudLink Center cluster. You cannot remove the master server. Before removing the slave server in CloudLink Center, the master server s keystore (if external) must be changed to the local keystore. 1. Stop the server. 2. Log in to the master CloudLink Center: https://master_clc_address:8443/master 3. Click the SecureVM tab. 4. From the Options panel, click Cluster. 5. In the Cluster Members panel, right-click the server and click Remove. CloudLink Center Administration Guide for SecureVM 3.2 47

Considerations for Working with a CloudLink Center Cluster When accessing CloudLink Center to perform administration tasks, use the following URL to ensure that you are connected to the master server: https://master_clc_address:8443/master The Topology Tree indicates whether the currently selected CloudLink Center is the master or slave. If a SecureVM Agent is disconnected from the master when waiting for a pending key release, it will reconnect to the current master. Viewing Logs and Events CloudLink Center logs provide comprehensive information about all events associated with CloudLink Center and VM clients. All CloudLink logs have four categories: Actions Alarms Events Security events CloudLink Center displays only those logs generated over the past six hours. A maximum of 60 log records is displayed for each log category. However, CloudLink stores all logs for two days for reporting via SNMP. To configure CloudLink for SNMP, see SNMP Configuration. To view all logs, log on to in CloudLink Center as a secadmin user. A CloudLink admin user can view Actions, Alarms, and Events logs. The CloudLink observer user can view only Alarms and Events logs. This section covers the following topics: Viewing the CloudLink Actions Log Viewing the CloudLink Alarms Log Viewing the CloudLink Events Log Viewing the CloudLink Security Events Log CloudLink Center Administration Guide for SecureVM 3.2 48

Viewing the CloudLink Actions Log To view the CloudLink Actions log, click the actions icon at the bottom of the CloudLink Center window: The actions icon appears dimmed if the log contains no records and if all the action records have timed out. Each action record will stay active for 5 minutes and then will be cleared from the panel (fixed time out). You can use the Show all checkbox to display all Action records, including the timed-out records. The Actions log window shows the actions associated with particular user actions (for example, storage operations or starting or stopping SLA tests). For example: An action record contains the following information: Name: Action name. Object: The name of the VM from which the action was performed. Status: Action status. User: User who performed the action. IP: The IP address of the computer where the action was performed. Started: Action started time stamp. Completed: Action completed time stamp. Details: Additional information about the action; for example, why the action failed. CloudLink Center Administration Guide for SecureVM 3.2 49

Viewing the CloudLink Alarms Log To view the CloudLink Alarms log, click the alarms icon at the bottom of the CloudLink Center window: The alarms icon appears dimmed if the log contains no unacknowledged alarm records. The Alarms log window records all major and critical severity alarms. An alarms record contains the following information: Time: The alarm generation time. Name: The alarm name. Object: The name of the VM from which the alarm was generated. Viewing the CloudLink Events Log To view the CloudLink Events Log, click the events icon at the bottom of the CloudLink Center window: The events icon appears dimmed if the Events log contains no records and if all the Event records have timed out. Each event record will stay active for 5 minutes and then will be cleared from the panel (fixed time out). You can use the Show all checkbox to show all Events records, including the timed-out records. The Events log window records all moderate and minor severity events. An events record contains the following information: Time: The event generation time. Name: The event name. Object: The name of the VM where the event was generated. CloudLink Center Administration Guide for SecureVM 3.2 50

Viewing the CloudLink Security Events Log To view the CloudLink Security Events log, open CloudLink Center using the secadmin user account and click the security events icon at the bottom of the CloudLink Center window: The security events icon appears dimmed if the Security Events log contains no records and if all the Security Event records have timed out. Each security event record will stay active for 5 minutes and then will be cleared from the panel (fixed time out). You can use the Show all checkbox to show all Security Event records, including the timed-out records. The Security Events log window shows all CloudLink security events. A security event record contains the following information: Time: The security event generation time. Action: The action name. User: User who performed the action. Object: The name of the VM where the security event was generated. IP: IP address of the computer where the action was performed. Permission: Status indicating whether the user is allowed to performed the action. Security events with the Permission of Denied are displayed in red. Details: Additional information about the action. CloudLink Center Administration Guide for SecureVM 3.2 51

Configuring Syslog If your organization requires the long-term retention of system events, we recommend that you configure CloudLink to forward its events to a centralized log server or SIEM via syslog. CloudLink Center lets you configure a syslog logger. When the syslog logger is configured, all system log messages are directed to the configured remote host. For information about network ports required, see the CloudLink SecureVM Deployment Guide. The log messages still appear in the CloudLink Center window. The priority levels are as follows: The info (information) priority level tag is assigned to the event logs. The notice priority level tag is assigned to the action logs. The alert priority level tag is assigned to both the security events logs and alarms. Configuring a Syslog Logger 1. Log in as a secadmin or admin user. 2. From the Topology Tree, select CloudLink Center. 3. Click the Administration tab. 4. On the Monitoring tab, in the Options panel, select Syslog. 5. On the Syslog tab, in the Host box, specify the IP address of the host to which the message logs will be sent. 6. In the Facility list, select the facility on which the syslog messages are to be logged. 7. Click Apply. For example: Note: By default, the syslog server status is Postponed, which means that logs are not sent out until the Syslog status is explicitly set to Resume. CloudLink Center Administration Guide for SecureVM 3.2 52

8. Right-click a host and select Resume. Note: Once syslog is activated with the Resume command, messages will be sent to the configured Syslog server until the Postpone command is selected. The status changes to Accessible. If communication with the Syslog server fails, the syslog status is set to Inaccessible. Viewing Syslog Output Example output is as follows: to view the syslog output as stored in the facility: 1. Log in to the host where the system logs are stored. 2. Access the directory where the logs are located. 3. Enter the following command: $ tail /var/log/syslog Configuring SNMP CloudLink can generate SNMPv2 traps for the logs it records. It also provides MIBs which support get, get-next and walk operations for several CloudLink performance monitors. CloudLink stores all logs for two days for reporting via SNMP. This section covers the following topics: Viewing SNMP Configuration Creating a New Community String Deleting a Community String Viewing SNMP Trap Destinations CloudLink Center Administration Guide for SecureVM 3.2 53