Veritas NetBackup™ Appliance Security Guide
- About the NetBackup Appliance Security Guide
- User authentication
- User authorization
- Intrusion prevention and intrusion detection systems
- Log files
- Operating system security
- Data security
- Web security
- Network security
- Call Home security
- Remote Management Module (RMM) security
- Appendix A. Security release content
Recommended IPMI settings
This section lists the recommended IPMI settings to ensure a secure IPMI configuration.
Use the following recommendations when creating IPMI users:
Do not create accounts with null user names or passwords.
Limit the number of administrative users to one.
Disable any anonymous users.
To mitigate the CVE-2013-4786 vulnerability:
Use strong passwords to help prevent offline dictionary attacks and brute force attacks. The recommended password length is 16-20 characters.
Change the default user password (
sysadmin
) as soon as possible.Use Access Control Lists (ACLs) or isolated networks to limit access to the IPMI interface.
Use the following recommendations when applying login settings for IPMI users:
Table: Login security settings
Settings | Recommended values |
---|---|
Failed login attempts | 3 |
User Lockout time (min) | 60 seconds |
Force HTTPS | Yes Enable Force HTTPS to ensure that the IPMI connection always takes place over HTTPS. |
Web Session Timeout | 1800 |
Veritas recommends that you enable LDAP authentication.
Veritas recommends that you import a new or a custom SSL certificate.
Table: Remote session security settings
Settings | Recommended values |
---|---|
KVM Encryption | AES |
Media Encryption | Enable |
Do NOT set cipher to zero on the IPMI channel
Warning:
If the cipher 0 enabled on a channel, it allows anyone to perform any IPMI action with no authentication, effectively subverting IPMI security entirely. Disable it at all costs.
Only use ciphers 3, 8, and 12.
Use a dedicated Ethernet connection for IPMI and avoid sharing the physical server connection.
Use a static IP.
Avoid using DHCP.