Reference Guide
Additional Resources.....................................................................................................................5
Chapter 1: Authentication and access............................................................................................6
Authenticating and Managing User Accounts, Roles, and Privileges......................................................................6
Factory default management......................................................................................................................................6
Session rules....................................................................................................................................................................7
Username and password usage.................................................................................................................................. 7
ESXi passwords..............................................................................................................................................................8
Roles and privileges.......................................................................................................................................................8
User account management based on role privileges............................................................................................ 11
Reset admin and service account passwords........................................................................................................ 11
Certificates.......................................................................................................................................................................... 13
Viewing certificates..................................................................................................................................................... 13
Secure communication between PowerStore appliances within a cluster...........................................................14
Secure communication for replication and data import............................................................................................14
vSphere Storage API for Storage Awareness support............................................................................................. 14
CHAP authentication.........................................................................................................................................................15
Configuring CHAP..............................................................................................................................................................16
External SSH access......................................................................................................................................................... 16
Configuring external SSH access...................................................................................................................................16
SSH sessions................................................................................................................................................................. 17
Service account password......................................................................................................................................... 17
SSH authorization........................................................................................................................................................ 17
Appliance service scripts............................................................................................................................................ 17
Appliance node Ethernet service port and IPMItool............................................................................................ 18
NFS secure.......................................................................................................................................................................... 18
Security on file system objects.......................................................................................................................................19
File systems access in a multiprotocol environment................................................................................................ 20
User mapping................................................................................................................................................................20
Access policies for NFS, SMB, and FTP................................................................................................................ 22
Credentials for file level security............................................................................................................................. 23
Understanding Common AntiVirus Agent (CAVA)....................................................................................................25
Code signing....................................................................................................................................................................... 25
Chapter 2: Communication security settings............................................................................... 26
Port Usage.......................................................................................................................................................................... 26
Appliance network ports............................................................................................................................................26
Appliance network ports related to file..................................................................................................................28
Network ports related to PowerStore X model appliances...............................................................................30
Chapter 3: Auditing..................................................................................................................... 33
Auditing................................................................................................................................................................................33
Chapter 4: Data security settings................................................................................................ 34
Contents
Contents 3










