Veritas NetBackup™ 8.0 Security and Encryption Guide
- Increasing NetBackup security
- Security deployment models
- Port security
- About NetBackup daemons, ports, and communication
- Additional port information for products that interoperate with NetBackup
- About configuring ports
- Auditing NetBackup operations
- Configuring Enhanced Auditing
- Access control security
- NetBackup Access Control Security (NBAC)
- Configuring NetBackup Access Control (NBAC)
- Configuring Access Control host properties for the master and media server
- Access Control host properties dialog for the client
- Troubleshooting Access Management
- Windows verification points
- UNIX verification points
- Verification points in a mixed environment with a UNIX master server
- Verification points in a mixed environment with a Windows master server
- About determining who can access NetBackup
- Viewing specific user permissions for NetBackup user groups
- Security certificates in NetBackup
- Overview of security certificates in NetBackup
- About the Security Management utilities
- About host name-based certificates
- About host ID-based certificates
- Using the Certificate Management utility to issue and deploy host ID-based certificates
- About certificate deployment security levels
- Setting up trust with the master server (Certificate Authority)
- About reissuing host ID-based certificates
- About Token Management for host ID-based certificates
- About revoking host ID-based certificates
- Security certificate deployment in a clustered NetBackup setup
- About deployment of a host ID-based certificate on a clustered NetBackup host
- About deploying a new host ID-based certificate
- Data at rest encryption security
- About NetBackup client encryption
- Configuring standard encryption on clients
- About configuring standard encryption from the server
- Configuring legacy encryption on clients
- About configuring legacy encryption from the client
- About configuring legacy encryption from the server
- Additional legacy key file security for UNIX clients
- Data at rest key management
- About the Key Management Service (KMS)
- Installing KMS
- Configuring KMS
- About key groups and key records
- Overview of key record states
- Configuring NetBackup to work with KMS
- About using KMS for encryption
- KMS database constituents
- Command line interface (CLI) commands
- About exporting and importing keys from the KMS database
- Troubleshooting KMS
Deploying certificates on a client that has no connectivity with the master server
The -getCertificate command that retrieves a host-ID based certificate must communicate directly with the master server. If a client has no connectivity with the master server, another NetBackup host that can communicate with the master server is used as a proxy for the client.
To deploy a certificate via a proxy host
- The host administrator of the non-master host runs the following command on the host where the certificate needs to be deployed:
nbcertcmd -createCertRequest -requestFile request_file_name -server master_server_name
The command generates a certificate signing request.
- Copy the Certificate Signing Request (CSR) file to a proxy NetBackup host that has connectivity with the master server.
- On the proxy host, get a signed certificate from the master server on behalf of the client.
A token is mandatory for the following operation. If the host had already been issued a certificate, then a reissue token is required. Run the following command on the proxy NetBackup host. Any user can run this command on the proxy host:
nbcertcmd -signCertificate -requestFile request_file_name -certificateFile certificate_file_name -token
- Copy the signed certificate that was generated in step 3 and convey it to the administrator of the client.
- To deploy the signed certificate on the client, the host administrator runs the following command on the client:
nbcertcmd -deployCertificate -certificateFile certificate_file_name