Veritas NetBackup™ Appliance Security Guide
- About the NetBackup appliance Security Guide
- User authentication
- About user authentication on the NetBackup appliance
- About configuring user authentication
- About authenticating LDAP users
- About authenticating Active Directory users
- About authentication using smart cards and digital certificates
- About single sign-on (SSO) authentication and authorization
- About the appliance login banner
- About user name and password specifications
- User authorization
- Intrusion prevention and intrusion detection systems
- About Symantec Data Center Security on the NetBackup appliance
- About the NetBackup appliance intrusion prevention system
- About the NetBackup appliance intrusion detection system
- Reviewing SDCS events on the NetBackup appliance
- Running SDCS in unmanaged mode on the NetBackup appliance
- Running SDCS in managed mode on the NetBackup appliance
- Log files
- Operating system security
- Data security
- Web security
- Network security
- Call Home security
- Remote Management Module (RMM) security
- STIG and FIPS conformance
- Index
About FIPS compliant ciphers
The appliance restricts the use of FIPS compliant ciphers to communicate with Kerberos, AD and LDAP servers to strengthen the security of the appliance.
If you have configured the appliance to use the Kerberos server, only the following FIPS compliant ciphers are used for communicating with the Kerberos server.
aes256-cts-hmac-sha1-96
aes128-cts-hmac-sha1-96
If you have configured the appliance to use the LDAP server, only TLS v1.2 and the following FIPS compliant ciphers are used for communicating with the LDAP server.
ecdhe-rsa-aes128-gcm-sha256
ecdhe-rsa-aes256-gcm-sha384
dhe-rsa-aes128-gcm-sha256
dhe-rsa-aes256-gcm-sha384
If you have configured the appliance to use the AD server, only the following FIPS compliant ciphers are used for communicating with the AD server.
aes256-cts-hmac-sha1-96
aes128-cts-hmac-sha1-96
When you run the Main > Settings > Security > FIPS > Enable All command, the following cipher policies are enforced:
cipher = AES-256-GCM AES-256-CCM AES-256-CTR AES-256-CBC AES-128-GCM AES-128-CCM AES-128-CTR AES-128-CBC
group = SECP256R1 SECP384R1 SECP521R1 FFDHE-2048 FFDHE-3072 FFDHE-4096 FFDHE-6144 FFDHE-8192
hash = SHA2-256 SHA2-384 SHA2-512 SHA2-224 SHA3-256 SHA3-384 SHA3-512
key_exchange = ECDHE DHE DHE-RSA PSK DHE-PSK ECDHE-PSK
mac = AEAD HMAC-SHA2-256 HMAC-SHA1 HMAC-SHA2-384 HMAC-SHA2-512