Veritas NetBackup™ Security and Encryption Guide
- Increasing NetBackup security
- About NetBackup security and encryption
 - NetBackup security implementation levels
 - World-level security
 - Enterprise-level security
 - Datacenter-level security overview
 - NetBackup Access Control (NBAC)
 - Combined world, enterprise, and data center levels
 - NetBackup security implementation types
 - Operating system security
 - NetBackup security vulnerabilities
 - Standard NetBackup security
 - Client side encryption security
 - NBAC on master, media server, and graphical user interface security
 - NBAC complete security
 
 - Security deployment models
- Workgroups
 - Single datacenters
 - Multi-datacenters
 - Workgroup with NetBackup
 - Single datacenter with standard NetBackup
 - Single datacenter with client side encryption
 - Single datacenter with NBAC on master and media servers
 - Single datacenter with NBAC complete
 - Multi-datacenter with standard NetBackup
 - Multi-datacenter with client side encryption
 - Multi-datacenter with NBAC on master and media servers
 - Multi-datacenter with NBAC complete
 
 - Port security
- About NetBackup TCP/IP ports
 - About NetBackup daemons, ports, and communication
- Standard NetBackup ports
 - NetBackup master server outgoing ports
 - NetBackup media server outgoing ports
 - NetBackup enterprise media management (EMM) server outgoing ports
 - Client outgoing ports
 - Java server outgoing ports
 - Java console outgoing ports
 - About MSDP port usage
 - About Cloud port usage
 - Additional port information for products that interoperate with NetBackup
- About communication ports and firewall considerations in OpsCenter
 - Ports required to communicate with backup products
 - Web browser to launch OpsCenter user interface
 - About OpsCenter user interface and OpsCenter server software communication
 - About OpsCenter server to NetBackup master server (NBSL) communication
 - About SNMP traps
 - About communication between OpsCenter and Sybase database
 - About email communication in OpsCenter
 
 
 - About configuring ports
 - Port requirements for NDMP backups
 - Known firewall problems encountered when using NetBackup with third-party robotic products
 
 - Auditing NetBackup operations
- About NetBackup auditing
 - Viewing the current audit settings
 - Audit retention period and catalog backups of audit records
 - Viewing the detailed NetBackup audit report
 - User identity in the audit report
 - Disabling auditing
 - Audit alert notification for audit failures (NetBackup Administration Console)
 - About Enhanced Auditing
 
 - Access control security
 - NetBackup Access Control Security (NBAC)
- About using NetBackup Access Control (NBAC)
 - NetBackup access management administration
 - About NetBackup Access Control (NBAC) configuration
 - Configuring NetBackup Access Control (NBAC)
- NBAC configuration overview
 - Configuring NetBackup Access Control (NBAC) on standalone master servers
 - Installing the NetBackup master server highly available on a cluster
 - Configuring NetBackup Access Control (NBAC) on a clustered master server
 - Configuring NetBackup Access Control (NBAC) on media servers
 - Installing and configuring access control on clients
 - About including authentication and authorization databases in the NetBackup hot catalog backups
 - NBAC configure commands summary
 - Unifying NetBackup Management infrastructures with the setuptrust command
 - Using the setuptrust command
 
 - Configuring Access Control host properties for the master and media server
 - Access Control host properties dialog for the client
 - Using NetBackup Access Control (NBAC) with Auto Image Replication
 - Troubleshooting Access Management
- Troubleshooting NBAC issues
 - Configuration and troubleshooting topics for NetBackup Authentication and Authorization
 - Windows verification points
 - UNIX verification points
 - Verification points in a mixed environment with a UNIX master server
 - Verification points in a mixed environment with a Windows master server
 - About the nbac_cron utility
 - Using the nbac_cron utility
 
 - Using the Access Management utility
 - About determining who can access NetBackup
 - Viewing specific user permissions for NetBackup user groups
- Granting permissions
 - Authorization objects
 - Media authorization object permissions
 - Policy authorization object permissions
 - Drive authorization object permissions
 - Report authorization object permissions
 - NBU_Catalog authorization object permissions
 - Robot authorization object permissions
 - Storage unit authorization object permissions
 - DiskPool authorization object permissions
 - BUAndRest authorization object permissions
 - Job authorization object permissions
 - Service authorization object permissions
 - HostProperties authorization object permissions
 - License authorization object permissions
 - Volume group authorization object permissions
 - VolumePool authorization object permissions
 - DevHost authorization object permissions
 - Security authorization object permissions
 - Fat server authorization object permissions
 - Fat client authorization object permissions
 - Vault authorization object permissions
 - Server group authorization object permissions
 - Key management system (kms) group authorization object permissions
 
 - Upgrading NetBackup Access Control (NBAC)
 
 - About AD and LDAP domains
 - Security management using NetBackup CA and NetBackup certificates
- Overview of security certificates in NetBackup
 - About secure communication in NetBackup
 - About the Security Management utilities
 - About audit events
 - About host management
- Hosts tab
 - Adding host ID to host name mappings
 - Add or Remove Host Mappings dialog box
 - Removing host ID to host name mappings
 - Mappings for Approval tab
 - Viewing auto-discovered mappings
 - Mapping Details dialog box
 - Approving host ID to host name mappings
 - Rejecting host ID to host name mappings
 - Adding shared or cluster mappings
 - Add Shared or Cluster Mappings dialog box
 - Resetting NetBackup host attributes
 - Allowing or disallowing automatic certificate reissue
 - Adding or deleting comment for a host
 
 - About global security settings
- About secure communication settings
 - Disabling insecure communication
 - About insecure communication with 8.0 and earlier hosts
 - About communication with 8.0 or earlier host in multiple NetBackup domains
 - Automatically mapping host ID to host names and IP addresses
 - About disaster recovery settings
 - Setting a passphrase to encrypt disaster recovery packages
 - Disaster recovery packages
 
 - About host name-based certificates
 - About host ID-based certificates
- Web login requirements for nbcertcmd command options
 - Using the Certificate Management utility to issue and deploy host ID-based certificates
 - About NetBackup certificate deployment security levels
 - Automatic host ID-based certificate deployment
 - Deploying host ID-based certificates
 - Deploying host ID-based certificates in an asynchronous manner
 - Implication of clock skew on certificate validity
 - Setting up trust with the master server (Certificate Authority)
 - Forcing or overwriting certificate deployment
 - Retaining host ID-based certificates when reinstalling NetBackup on non-master hosts
 - Deploying certificates on a client that has no connectivity with the master server
 - About host ID-based certificate expiration and renewal
 - Deleting sensitive certificates and keys from media servers and clients
 - Cleaning host ID-based certificate information from a host before cloning a virtual machine
 - About reissuing host ID-based certificates
 
 - About Token Management for host ID-based certificates
 - About the host ID-based certificate revocation list
 - About revoking host ID-based certificates
 - Deleting host ID-based certificates
 - Host ID-based certificate deployment in a clustered setup
- About deployment of a host ID-based certificate on a clustered NetBackup host
 - Deploying host ID-based certificates on cluster nodes
 - Revoking a host ID-based certificate for a clustered NetBackup setup
 - Deploying a host ID-based certificate on a clustered NetBackup setup using reissue token
 - Creating a reissue token for a clustered NetBackup setup
 - Renewing a host ID-based certificate on a clustered NetBackup setup
 - Viewing certificate details of a clustered NetBackup setup
 - Removing CA certificates from a clustered NetBackup setup
 - Generating a certificate on a clustered master server after disaster recovery installation
 
 - About the communication between a NetBackup client located in a demilitarized zone and a master server through an HTTP tunnel
 - Adding a NetBackup host manually
 
 - External CA support in NetBackup
- About external CA support in NetBackup
 - Workflow to use external certificates for NetBackup host communication
 - Configuration options for external CA-signed certificates
- ECA_CERT_PATH for NetBackup servers and clients
 - ECA_TRUST_STORE_PATH for NetBackup servers and clients
 - ECA_PRIVATE_KEY_PATH for NetBackup servers and clients
 - ECA_KEY_PASSPHRASEFILE for NetBackup servers and clients
 - ECA_CRL_CHECK for NetBackup servers and clients
 - ECA_CRL_PATH for NetBackup servers and clients
 - ECA_CRL_PATH_SYNC_HOURS for NetBackup servers and clients
 - ECA_CRL_REFRESH_HOURS for NetBackup servers and clients
 - ECA_DISABLE_AUTO_ENROLLMENT for NetBackup servers and clients
 - ECA_DR_BKUP_WIN_CERT_STORE for NetBackup servers and clients
 
 - About certificate revocation lists for external CA
 - About certificate enrollment
 - About viewing enrollment status of master servers
 - Configuring an external certificate for the NetBackup web server
 - Configuring the master server to use an external CA-signed certificate
 - Configuring a NetBackup host (media server, client, or cluster node) to use an external CA-signed certificate after installation
 - Enrolling an external certificate for a remote host
 - Viewing the certificate authorities that your NetBackup domain supports
 - Viewing external CA-signed certificates in the NetBackup web UI
 - Renewing a file-based external certificate
 - Removing certificate enrollment
 - Disabling the NetBackup CA in a NetBackup domain
 - Enabling the NetBackup CA in a NetBackup domain
 - Disabling an external CA in a NetBackup domain
 - Changing the subject name of an enrolled external certificate
 - About external certificate configuration for a clustered master server
 
 - About API keys in NetBackup
 - Data at rest encryption security
- Data at rest encryption terminology
 - Data at rest encryption considerations
 - Encryption security questions to consider
 - Comparison of encryption options
 - About NetBackup client encryption
 - Configuring standard encryption on clients
- Managing standard encryption configuration options
 - Managing the NetBackup encryption key file
 - About configuring standard encryption from the server
 - Restoring an encrypted backup file to another client
 - About configuring standard encryption directly on clients
 - Setting standard encryption attribute in policies
 - Changing the client encryption settings from the NetBackup server
 
 - Configuring legacy encryption on clients
- About configuring legacy encryption from the client
 - About configuring legacy encryption from the server
 - Restoring a legacy encrypted backup created on another client
 - About setting legacy encryption attribute in policies
 - Changing client legacy encryption settings from the server
 - Additional legacy key file security for UNIX clients
 
 
 - Data at rest key management
- Federal Information Processing Standards (FIPS)
 - About FIPS enabled KMS
 - About the Key Management Service (KMS)
 - Installing KMS
 - Configuring KMS
- Creating the key database
 - About key groups and key records
 - Overview of key record states
 - About backing up the KMS database files
 - About recovering KMS by restoring all data files
 - Recovering KMS by restoring only the KMS data file
 - Recovering KMS by regenerating the data encryption key
 - Problems backing up the KMS data files
 - Solutions for backing up the KMS data files
 - Creating a key record
 - Listing keys from a key group
 - Configuring NetBackup to work with KMS
 
 - About using KMS for encryption
 - KMS database constituents
 - Command line interface (CLI) commands
- CLI usage help
 - Create a new key group
 - Create a new key
 - Modify key group attributes
 - Modify key attributes
 - Get details of key groups
 - Get details of keys
 - Delete a key group
 - Delete a key
 - Recover a key
 - About exporting and importing keys from the KMS database
 - Modify host master key (HMK)
 - Get host master key (HMK) ID
 - Get key protection key (KPK) ID
 - Modify key protection key (KPK)
 - Get keystore statistics
 - Quiesce KMS database
 - Unquiesce KMS database
 - Key creation options
 
 - Troubleshooting KMS
 
 - Regenerating keys and certificates
- About regenerating keys and certificates
 - Regenerating NetBackup authentication broker keys and certificates
 - Regenerating host identity keys and certificates
 - Regenerating web service keys and certificates
 - Regenerating nbcertservice keys and certificates
 - Regenerating tomcat keys and certificates
 - Regenerating JWT keys
 - Regenerating NetBackup gateway certificates
 - Regenerating web trust store certificates
 - Regenerating VMware vCenter plug-in certificates
 - Regenerating OpsCenter Administrator Console session certificates
 - Regenerating OpsCenter keys and certificates
 - Regenerating NetBackup encryption key file
 
 - NetBackup web services account
 
Changing a server across NetBackup domains
For Enhanced Auditing, when you perform a Change Server operation from a master or media server in one NetBackup domain to a host (master or media server or client) in another NetBackup domain, you must execute additional steps on each NetBackup server. You must also set up a trust on both master servers.
Note:
Executing these steps is a one-time activity.
The following steps help you to change the server and set up the trust on both master servers.
To change server from a master to master server
- We have two NetBackup domains, NetBackup Domain 1 and NetBackup Domain 2.
Consider two master servers, Master_nbu_dom1 and Master_nbu_dom2. Master_nbu_dom1 has media servers Media1_nbu_dom1, Media2_nbu_dom1, MediaN_nbu_dom1, and a set of clients. Similarly, Master_nbu_dom2 has media servers Media1_nbu_dom2, Media2_nbu_dom2, MediaM_nbu_dom2, and a set of clients as shown in the image:
The user is connected to one of the servers in NetBackup Domain 1 (either master or media), for example, Master_server_nbu_dom1, and wants to do a change server to one of the hosts on NetBackup Domain 2, for example Host_nbu_dom2. It is mandatory that both the master servers (Master_nbu_dom1 and Master_nbu_dom2 here) establish a trust. Host_nbu_dom2 must set up a trust with Master_server_nbu_dom1.
 - To set up the trust, you must invoke a set of commands on UNIX and Windows:
On UNIX and Linux:
/usr/openv/netbackup/sec/at/bin/vssat setuptrust - b
Master_server_nbu_dom1:1556:nbatd -s high on Host_nbu_dom2.
On Windows:
InstallPath\Veritas\NetBackup\sec\at\bin\vssat.bat
 - You must add an additional server entry in Host_nbu_dom2 for the Master_server_nbu_dom1 in the bp.conf file. Run the following command:
SERVER = Master_server_nbu_dom1 /*this should __not__ be the first SERVER entry*/
You can also add the additional server entry by connecting to the target master server through the NetBackup Administration Console.
 - The host that has  the NetBackup Administration Console or the remote Java Administration console is also required to trust the X.509 NBATD certificate on the Master_server_nbu_dom2. 
The trust can be set up by directly connecting to the Master_server_nbu_dom2master server through the GUI.
You can also invoke /usr/openv/java/sec/at/bin/vssat setuptrust -b
Master_server_nbu_dom2:1556:nbatd -s high on the NetBackup Administration Console host.