StorageGRID Webscale 10.0

Size: px
Start display at page:

Download "StorageGRID Webscale 10.0"

Transcription

1 StorageGRID Webscale 10.0 Cloud Data Management Interface Implementation Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA U.S. Telephone: +1 (408) Fax: +1 (408) Support telephone: +1 (888) Web: Feedback: Part number: _A0 September 2014

2

3 Table of Contents 3 Contents Introduction to CDMI implementation... 6 Who should read this guide... 6 Revision history... 6 Supported versions of CDMI and HTTP... 6 How the StorageGRID Webscale system implements CDMI... 7 CDMI specification sections supported by the StorageGRID Webscale system... 7 How client applications store data objects through a CLB service How client applications retrieve data objects (CLB service) How client applications retrieve data objects through an LDR service How the StorageGRID Webscale system resolves conflicts How the system's ILM rules and metadata manage data objects How the StorageGRID Webscale system implements immediate redundancy CDMI namespace permissions you can specify Client application access permissions and HTTP methods What the Read access type is Use of GET method to read data objects and data object metadata Use of GET method to retrieve data and container object metadata Predefined metadata Modify or write access How applications use the HTTP PUT and POST methods to create and store objects How applications use HTTP PUT to update metadata Delete access Query access Last access time metadata Connecting client applications using CDMI Configuring the StorageGRID Webscale system to accept client connections Associating client application IP addresses with link-cost groups Creating HTTP profiles to set namespace permissions Associating HTTP profiles with client applications How client application authentication works Finding IP addresses for grid nodes... 24

4 4 StorageGRID Webscale CDMI Implementation Guide Finding CDMI port numbers for the LDR and CLB services How the StorageGRID Webscale system implements security in CDMI Configuring a custom server certificate Reverting a custom server certificate to the default certificate Copying the StorageGRID Webscale system's CA certificate How client applications use certificates for security in CDMI Supported hashing and encryption algorithms for TLS libraries Choosing hash algorithms for data objects How security partitions are used Testing client application connections to the system CDMI root URI Testing HTTP connections by using Telnet Testing HTTP connections by using OpenSSL Retrieving CDMI capabilities with curl Testing nameless data object storage and retrieval by using curl Testing named data object storage and retrieval by using curl Using client applications and the StorageGRID Webscale system Managing HTTP connections Viewing HTTP transactions for CDMI objects Accessing audit logs Viewing information about data objects Time synchronization between client applications and the system How CDMI retrieves data objects stored in client applications How the StorageGRID Webscale system uses UUIDs How the StorageGRID Webscale system uses UUIDs and CDMI object IDs Ruby code examples for deriving a CDMI data object ID from a UUID Benefits of active, idle, and concurrent HTTP sessions Benefits of different types of HTTP sessions Benefits of keeping idle HTTP sessions open Benefits of active HTTP sessions Benefits of concurrent HTTP sessions Separation of HTTP session pools for read and write operations How client applications affect the HTTP transaction load Copyright information Trademark information... 52

5 Table of Contents 5 How to send your comments Index... 54

6 6 StorageGRID Webscale CDMI Implementation Guide Introduction to CDMI implementation The StorageGRID Webscale system supports the storage and retrieval of objects by applications that interface to the StorageGRID Webscale system through the Cloud Data Management Interface (CDMI). For basic information about the StorageGRID Webscale system, see the StorageGRID Webscale 10.0 Grid Primer and the StorageGRID Webscale 10.0 Administrator Guide. Who should read this guide Your should use the Cloud Data Management Interface Implementation Guide if you are creating applications that interface with the StorageGRID Webscale system through CDMI. You can also use the guide to gain a basic understanding of how the StorageGRID Webscale system supports CDMI. Revision history The following table lists changes to the StorageGRID Webscale system's support for CDMI along with the accompanying changes to the documentation. You might find it helpful to identify those changes in preparing for CDMI implementation. Date Release Comments September Added support for named objects and multipart MIME. Supported versions of CDMI and HTTP The StorageGRID Webscale system supports specific versions of CDMI and HTTP. When you are developing the interface with your client application, it is helpful to know the supported versions. The following versions are supported: Item Version CDMI specification Published by the Storage Networking Industry Association (SNIA) HTTP 1.1 For more information about HTTP, see HTTP/1.1 (RFC 2616).

7 7 How the StorageGRID Webscale system implements CDMI A client application can connect to the CLB service or LDR service, create object containers, and store and retrieve data objects. The StorageGRID Webscale system uses information lifecycle management (ILM) rules to manage these data objects ingested into the StorageGRID Webscale system by a client application that interfaces to the system through CDMI. When you are designing interfaces to the system, It might be helpful to know how the system processes your data objects. For more information about ILM rules, see the Administrator Guide. CDMI specification sections supported by the StorageGRID Webscale system The StorageGRID Webscale system supports the Cloud Data Management Interface (CDMI) specification published by the Storage Networking Industry Association (SNIA). You might find it helpful to understand how the system implements various sections of the CDMI specification. Data object resource operations The StorageGRID Webscale system supports a single CDMI domain. Data objects ingested through the StorageGRID Application Programming Interface (SGAPI) can be accessed through CDMI. Likewise, data objects ingested through CDMI can be accessed through SGAPI. To access through CDMI a data object that was ingested through SGAPI, you must convert the data object's UUID (returned in an SGAPI ingest response) to a CDMI Object ID. The following table lists the supported Data Resource Operations sections of the Cloud Data Management Interface (CDMI) specification. Section number Section description 8.4 Read a data object (CDMI Content Type) 8.5 Read a data object (Non-CDMI Content Type) 8.6 Update a data object (CDMI Content Type) 8.7 Update a data object (Non-CDMI Content Type) 8.8 Delete a data object (CDMI Content Type) 8.9 Delete a data object (Non-CDMI Content Type)

8 8 StorageGRID Webscale CDMI Implementation Guide Byte range read operations The StorageGRID Webscale system supports byte range read operations using both CDMI and non- CDMI content types. For byte range read using non-cdmi content type, the following byte range is returned by the StorageGRID Webscale system: If a single contiguous byte range is requested, the system returns the byte range. If multiple byte ranges are requested that can be coalesced without holes, the system returns a single coalesced range. If multiple byte ranges are requested that cannot be coalesced without holes, the system returns the entire data object bytes. The length of time the system takes to return requested portions of a data object is impacted by the following: If you enable compression (by using the Grid Management > Grid Configuration > Configuration > Stored Object Compression option) or if the data object is retrieved from tape, the StorageGRID Webscale system locates and returns the requested portion of the data object by reading the data object, starting at the beginning of the segment containing the first byte of the requested range. If you disable compression and the data object is retrieved from disk, the StorageGRID Webscale system is able to begin reading the segment from the start of the requested byte range and not the beginning of the segment. Thus, if compression is enabled or the data object is retrieved from tape, it takes the system longer to return the requested portion of a data object. Container object resource operations The StorageGRID Webscale system supports container objects, named data objects, and the Container Object Resource Operations section of the CDMI specification. For named data objects, your StorageGRID Webscale system always includes a public administrative container object. For each StorageGRID Webscale system, there is only one public container object, which cannot be deleted. Client applications can create more than one container object under the public container object (public/<container> ). All named data objects must be created in containers under public. To delete a container object, it must be empty. You must use the HTTP POST method to store nameless objects in the StorageGRID Webscale domain. Note: Container object metadata is not supported by the StorageGRID Webscale system. The following table lists the supported "Container Object Resource Operations" sections of the Cloud Data Management Interface (CDMI) specification.

9 How the StorageGRID Webscale system implements CDMI 9 Section number Section description 9.2 Create a container object (CDMI content type 9.3 Create a container object (non-cdmi content type) 9.4 Read a container object (CDMI content type) 9.6 Delete a container object (CDMI content type) 9.7 Delete a container object (non-cdmi content type) 9.8 Create (POST) a new data object (CDMI content type) 9.9 Create (POST) a new data object (non-cdmi content type) Domain object resource operations The StorageGRID Webscale system supports a single CDMI domain. The creation of additional domains is not supported. Capability object resource operations The following table lists the supported "Capability object Resource Operations" sections of the Cloud Data Management Interface (CDMI) specification. Section Section description Notes 12.2 Read a capabilities object (CDMI Content Type) The StorageGRID Webscale system supports the following: System-wide capabilities Storage system metadata capabilities Data system metadata capabilities Data object capabilities Metadata The following table lists the supported "Metadata" sections of the Cloud Data Management Interface (CDMI) specification.

10 10 StorageGRID Webscale CDMI Implementation Guide Section Section description Notes 16.3 Storage system metadata The StorageGRID Webscale system supports the following: cdmi_size cdmi_ctime cdmi_atime cdmi_hash 16.4 Data system metadata The StorageGRID Webscale system supports the following: cdmi_data_redundancy cdmi_immediate_redundancy cdmi_value_hash 16.5 Provided data system metadata The StorageGRID Webscale system supports the following: cdmi_value_hash_provided The StorageGRID Webscale system converts the following StorageGRID Webscale metadata to populate the values of some CDMI storage system metadata. The following table identifies which StorageGRID Webscale metadata is used to populate CDMI system metadata. For more information, see the StorageGRID Administrator Guide. CDMI storage system metadata cdmi_size cdmi_ctime cdmi_atime cdmi_hash StorageGRID Webscale metadata CSIZ CTME LATM The StorageGRID Webscale system uses the value from cdmi_ctime when a data object lacks LATM (last access time) metadata. The StorageGRID Webscale system returns the hash for the data object.

11 How the StorageGRID Webscale system implements CDMI 11 CDMI storage system metadata cdmi_value_hash_provided StorageGRID Webscale metadata The StorageGRID Webscale system returns the name of the hash algorithm selected in the NMS Management Interface (NMS MI) when the system stored the data object. Data objects stored in the StorageGRID Webscale system by SGAPI client applications can include non-cdmi metadata. For example, when SGAPI client applications store objects in the system, these client applications can use predefined metadata, which is a type of metadata for SGAPI client applications and the StorageGRID Webscale system. When you use CDMI client applications to retrieve these data objects, the response includes the predefined metadata. Extensions The StorageGRID Webscale system supports the CDMI Multi-part MIME Extension 1.0g for the creation and retrieval of both named and nameless data objects, otherwise subject to the same limitations for data object operations within the StorageGRID Webscale system's standard CDMI implementation. This extension allows clients to read and write the CDMI value as binary in a multipart body part, which avoids incurring encoding (for example, base64) overhead on both the client and the server. Related concepts How CDMI retrieves data objects stored in client applications on page 43 Related tasks Retrieving CDMI capabilities with curl on page 34 Related information SNIA: SNIA Cloud Data Management Interface (CDMI) Version 1.0.2

12 12 StorageGRID Webscale CDMI Implementation Guide How client applications store data objects through a CLB service Client applications can use HTTP to connect directly with a CLB service and store data objects. The CLB service identifies the optimal LDR service to satisfy client requests and forwards requests to the LDR service. 1. The client application opens an HTTPS connection to the configured HTTP port for a CLB service. The CLB service acts as a proxy for the LDR services. 2. The client application issues an HTTP PUT or HTTP POST request that includes the data object and any metadata. 3. The CLB service identifies the optimal LDR service to satisfy client requests and forwards requests to the LDR service. Note: The CLB service uses ranking criteria to identify which LDR service to use. As a result, the client application does not have to identify which LDR service to use. 4. After the LDR service stores a copy of the data object, the LDR service returns a valid CDMI response to the client application through the CLB service.

13 How the StorageGRID Webscale system implements CDMI 13 How client applications retrieve data objects (CLB service) Client applications can use HTTP to connect directly with a CLB service and retrieve data objects. The CLB service identifies the optimal LDR service to satisfy client requests and forwards these requests to the LDR service. 1. The client application opens an HTTPS connection to the configured HTTP port for a CLB service. The CLB service acts as a proxy for the LDR services. 2. The client application issues an HTTP GET request that includes the object ID or name for the data object that it wants to retrieve. 3. The CLB service identifies the optimal LDR service to satisfy the request and forwards the request to the LDR service. Note: The CLB service uses ranking criteria to identify which LDR service to use. As a result, the client application does not have to identify which LDR service to use. 4. The LDR service returns the data object and any requested metadata.

14 14 StorageGRID Webscale CDMI Implementation Guide How client applications retrieve data objects through an LDR service Client applications can use HTTP to connect directly with an LDR service and retrieve data objects. A connection with one or more LDR services enables high-performance parallel transfers and eliminates the single point of failure that is associated with connecting to a CLB service. 1. The client application opens an HTTPS connection to the configured HTTP port for an LDR service. 2. The client application issues an HTTP GET request that includes the object ID or name. 3. The LDR service returns the data object and any requested metadata. A client application can connect directly with multiple LDR services. How the StorageGRID Webscale system resolves conflicts If the StorageGRID Webscale system detects that two or more objects with same name exist in the same container, the system allows these objects to remain, keeping the objects unique through the use of each object's UUID. However, conflicts might arise when a client application attempts to access an object by name and the action is not performed on the expected object. The StorageGRID Webscale system resolves this conflict by always performing actions on the most recently created object. How the system's ILM rules and metadata manage data objects The StorageGRID Webscale system's information lifecycle management (ILM) rules enable you to use metadata in rules to manage data objects automatically. You can use the following metadata: You can use object size, last access time, and CDMI user-defined metadata in ILM rules for data objects stored in the StorageGRID Webscale system by client applications interfacing to the system through CDMI. You can use object size to ensure that small objects are stored to disk and not tape, which avoids the poor retrieval performance of tape. You can use last access time metadata to identify content that has not been retrieved for a set amount of time and have this content moved to a cheaper grade of storage.

15 How the StorageGRID Webscale system implements CDMI 15 You can set the filter criteria to evaluate data objects against CDMI user defined metadata. The CDMI protocol handler version and last access time are StorageGRID Webscale system metadata. For more information about ILM rules, see the StorageGRID Webscale Administration Guide. How the StorageGRID Webscale system implements immediate redundancy The StorageGRID Webscale system supports the CDMI Data System Metadata Capabilities functionality cdmi_data_redundancy and cdmi_immediate_redundancy to save up to two copies of a data object (dual commit) to two Storage Nodes at object creation. This functionality provides protection against data loss should a Storage Node fail. A client application specifies redundancy with the data system metadata cdmi_data_redundancy and cdmi_immediate_redundancy in a CDMI POST request when creating a data object. If this metadata is not included in a CDMI content type request, the following defaults are assumed: "cdmi_data_redundancy" : "2" "cdmi_immediate_redundancy" : true These defaults also apply to non-cdmi content type POST data object create requests. For CDMI content type requests, you can display redundancy by setting cdmi_data_redundancy to false. Internally, the StorageGRID Webscale system achieves redundancy by using dual commit, which creates two copies of a data object. Thus, a cdmi_data_redundancy request with a value greater than 2 creates two copies and not the requested value. Note: Dual commit creates two copies of a data object before ILM rules are evaluated, which might create additional copies. The following table summarizes the responses for successful redundancy requests: Client application request cdmi_data_red undancy cdmi_immediat e_redundancy Does the system use dual commit? CDMI response for success cdmi_data_redunda ncy_provided not present not present Yes 2 true 0 true No 1 true 1 true No 1 true 2 true Yes 2 true cdmi_immediat e_redundancy_ provided

16 16 StorageGRID Webscale CDMI Implementation Guide Client application request cdmi_data_red undancy cdmi_immediat e_redundancy Does the system use dual commit? CDMI response for success cdmi_data_redunda ncy_provided cdmi_immediat e_redundancy_ provided not present false No 1 true because one data object was stored a number greater than 2 true Yes 2 true The following table summarizes the responses for failed redundancy requests: Client application request cdmi_data_red undancy cdmi_immediat e_redundancy Does the system use dual commit? CDMI response for failure cdmi_data_redunda ncy_provided not present not present No 1 false 0 true No 1 true 1 true No 1 true 2 true No 1 false not present false No 1 true a number greater than 2 true No 1 false Note: The system stores a maximum of two copies. cdmi_immediat e_redundancy_ provided After the StorageGRID Webscale system creates a copy of the data object, it evaluates the ILM rules for the copy and the data object. The rules in the ILM policy determine the actions the system takes with the copy and the data object. For example, the ILM rules might instruct the system to make additional copies of the data object in different locations and delete the original copy. For more information about dual commit and ILM rules, see the Administration Guide.

17 17 CDMI namespace permissions you can specify You can specify permissions (such as read, modify, delete, and query permissions) for client applications in the CDMI namespace in the StorageGRID Webscale system. For each permission, it is helpful to know its implementation and which HTTP methods you should use. Client application access permissions and HTTP methods In the NMS MI, you can specify whether a client application has permission to read, write, modify, or delete data objects in the CDMI namespace. You can also specify whether to enable last access time metadata. For each permission, it is helpful to know which HTTP methods you should use. You can grant or deny the following access to client applications through the StorageGRID Webscale system's NMS MI. The table also indicates the HTTP method used for each permission: Permission type Read Modify/Write Delete Query Last Access Time HTTP method GET PUT for modify access POST for write access DELETE The StorageGRID Webscale system does not support the Query option for CDMI client applications. GET You must enable both Last Access Time and Read. When a CDMI client application uses GET to retrieve a data object, the StorageGRID Webscale system stores the time that the CDMI application client retrieved the data object in internal object metadata called last access time metadata. What the Read access type is The Read access type determines whether a client application has permission to read and retrieve data objects and data object metadata from the CDMI namespace. Note: For data objects stored to the StorageGRID Webscale system by SGAPI client applications, you must derive the CDMI object ID from the StorageGRID Webscale UUID before you can read or retrieve the data object.

18 18 StorageGRID Webscale CDMI Implementation Guide Use of GET method to read data objects and data object metadata Client applications use the HTTP GET method and an object ID or name to read data objects and data object metadata in the CDMI namespace. Use of GET method to retrieve data and container object metadata Client applications use the HTTP GET method and an object ID or name to retrieve data object and container object metadata from the CDMI namespace. The response might include predefined metadata or custom metadata when an SGAPI client application created the object in the StorageGRID Webscale system. For GET, when the requested field childrenrange is specified and the requested field children is not included, the complete range of objects within the container is returned. For example, GET / CDMI/foo/?childrenrange returns "children range" : " ". If no requested fields are specified or the requested field children is specified without a range or a range that includes more than 10, 000 objects, GET is limited by a maximum range of 10,000 objects (0 through 9999). If a container includes more than 10,000 objects, multiple GET operations must be run. Predefined metadata Only SGAPI client applications can use predefined metadata with the StorageGRID Webscale system. Unless otherwise noted, predefined metadata becomes read only after the object is ingested into the StorageGRID Webscale system, and you cannot delete the metadata. Predefined metadata use the X- BYC-XXXX format, in which XXXX is one of the following values: Metadata Set by Status Description XVER Client application Read-only Indicates the version of the metadata Defined by the client application MCLS Client application Read-only Indicates the TSM management class Defined by the client application STR0-STR9 Client application Read-write Can be deleted Identifies a string value Value defined by the client application NUM0- NUM9 Client application Read-write Can be deleted Identifies a numerical value Value defined by the client application

19 CDMI namespace permissions you can specify 19 Modify or write access The Modify/Write access type determines whether a client application has permission to store data objects and update data object metadata in the namespace. How applications use the HTTP PUT and POST methods to create and store objects Client applications can create container objects, and store (create) both named and unnamed data objects in the StorageGRID Webscale system. Use the HTTP PUT and POST methods to create and store objects. Client applications use the following methods in the CDMI namespace: HTTP POST method to store unnamed data objects HTTP PUT method to create container objects and store named data objects By default, the StorageGRID Webscale system enables immediate redundancy for all POST requests for the CDMI content type and the non-cdmi content type. You can disable immediate redundancy for the CDMI content type, but not the non-cdmi content type. However, you should include cdmi_immediate_redundancy metadata set to true in all PUT and POST requests to enable immediate redundancy and protect against data loss. The StorageGRID Webscale system supports user metadata for CDMI data objects; however, the system does not support user metadata for CDMI container objects. Related concepts How the StorageGRID Webscale system implements immediate redundancy on page 15 How applications use HTTP PUT to update metadata Client applications use the HTTP PUT method to update data object user metadata in the CDMI namespace. The following considerations apply with the PUT method: The StorageGRID Webscale system supports adding or updating only all user metadata for a data object. It does not support adding or updating an individual user metadata item (using the URI syntax?metadata:<metadataname>). Updating other fields (for example, value or mimetype) using the PUT method is not supported.

20 20 StorageGRID Webscale CDMI Implementation Guide Delete access The Delete access type determines whether a client application has permission to delete data objects and container objects from the namespace. Query access The Query access type determines whether a client application has permission to perform queries in the namespace. Note: The StorageGRID Webscale system does not support the Query option for client applications. Last access time metadata The last access time permission determines whether the StorageGRID Webscale system updates last access time metadata for a data object when a client application retrieves the object. You can create information lifecycle management (ILM) rules to take action on data objects based on the last time that a client application retrieved the object. When a client application that is assigned an HTTP profile with last access time enabled uses GET to retrieve a data object, the StorageGRID Webscale system saves the retrieval time in internal object metadata called last access time metadata. Only the StorageGRID Webscale system can use internal metadata. For example, ILM policies can use last access time metadata to identify when an object was last retrieved. Note: Because last access time metadata updates each time that a client application retrieves a data object, it can affect system performance. It is recommended that you disable Last Access Time in the NMS MI when no ILM policies use last access time metadata. For more information about last access time metadata and ILM policies, see the Administration Guide.

21 21 Connecting client applications using CDMI You must configure the StorageGRID Webscale system to accept HTTP connections from client applications. Client applications use HTTP connections to access and communicate with the StorageGRID Webscale system. Note: IPv6 is only supported for client application connections through the CLB service. For more information about support for IPv6, see the Administrator Guide. Connecting client applications to the StorageGRID Webscale system involves the following tasks: Configuring client connections to accept HTTP connections Identifying IP addresses for grid nodes Identifying port numbers for CLB and LDR services Copying the system's certificate authority (CA) certificate for client applications that require server validation Configuring the StorageGRID Webscale system to accept client connections Configuring the StorageGRID Webscale system to accept HTTP connections from client applications requires you to complete several steps. Steps 1. Associating client application IP addresses with link-cost groups on page 22 You can associate a link-cost group with the IP addresses that client applications use to connect with the StorageGRID Webscale system. The link-cost group enables the StorageGRID Webscale system to route client applications to the appropriate servers. You can improve system performance when you associate a link-cost group with client applications. 2. Creating HTTP profiles to set namespace permissions on page 23 You can create HTTP profiles that identify whether read, write, modify, query, or delete permissions are enabled or disabled in a namespace. You can create multiple HTTP profiles. 3. Associating HTTP profiles with client applications on page 23 HTTP profiles identify whether read, write, modify, query, or delete permissions are enabled in a namespace. You can associate HTTP profiles with individual client applications or with groups of client applications, based on IP addresses. The association gives client applications access to the StorageGRID Webscale namespace and identifies the HTTP permissions for the client application in the namespace.

22 22 StorageGRID Webscale CDMI Implementation Guide Associating client application IP addresses with link-cost groups You can associate a link-cost group with the IP addresses that client applications use to connect with the StorageGRID Webscale system. The link-cost group enables the StorageGRID Webscale system to route client applications to the appropriate servers. You can improve system performance when you associate a link-cost group with client applications. About this task Servers for the StorageGRID Webscale system are organized into link-cost groups. Link-cost groups identify the cost of operating the group of servers. The system uses the IP address and the link-cost group to route clients to the LDR service or CLB service on the appropriate servers. Steps 1. In the NMS MI, select Grid Management > Grid Configuration > Link Cost Groups > Configuration > Main. 2. In the Client Group IP Ranges table, perform one of the following actions: When... No entries exist One or more entries exist Then... Click Edit. Click Insert. 3. In the IP Range Name box, type a name for the IP address or the range of IP addresses. You can use any name. The configuration does not reference the name elsewhere. 4. In the IP Range box, type the IP address or the range of IP addresses that the client uses to contact the StorageGRID Webscale system. Use a hyphen or slash to indicate an inclusive range of IP addresses, as shown in the following examples: /24 (CIDR format) (dotted decimal format) You can use an abbreviated format for masks in eight bit steps. For example, is equivalent to the CIDR notation /24, and you can extend it as follows: n.n.0.0 is equivalent to n.n.0.0/ In the Group ID list, select an ID. The ID number identifies the group of servers to which the client application with the specified IP address should connect. 6. Click Apply Changes.

23 7. Repeat this procedure for each range of IP addresses that client applications use to access the StorageGRID Webscale system. Creating HTTP profiles to set namespace permissions You can create HTTP profiles that identify whether read, write, modify, query, or delete permissions are enabled or disabled in a namespace. You can create multiple HTTP profiles. Steps Connecting client applications using CDMI In the NMS MI, select Grid Management > HTTP Management > Permissions > Configuration > Main. 2. In the HTTP /CDMI and /UUID Namespace table, perform one of the following actions: When... No entries exist One or more entries exist Then... Click Edit. Click Insert. 3. Check the boxes for the HTTP operations that you want to enable in the profile. The StorageGRID Webscale system does not support the Query operation in the HTTP /CDMI and /UUID Namespace for CDMI client applications. 4. Click Apply Changes. 5. Create additional profiles as needed. Associating HTTP profiles with client applications HTTP profiles identify whether read, write, modify, query, or delete permissions are enabled in a namespace. You can associate HTTP profiles with individual client applications or with groups of client applications, based on IP addresses. The association gives client applications access to the StorageGRID Webscale namespace and identifies the HTTP permissions for the client application in the namespace. Steps 1. In the NMS MI, select Grid Management > HTTP Management > Clients > Configuration > Main. 2. In the HTTP Entities table, perform one of the following actions: When... No HTTP entities exist One or more HTTP entities exist Then... Click Edit. Click Insert.

24 24 StorageGRID Webscale CDMI Implementation Guide 3. In the Description box, enter a description of the client. 4. In the IP Range box, enter the range of IP addresses that the client application can use to connect to the LDR service or the CLB service. 5. In the Profile Name list, select the name of the HTTP profile that you created. 6. Click Apply Changes. How client application authentication works The StorageGRID Webscale system uses its HTTP management settings to authenticate client application requests for access to the StorageGRID Webscale system. Understanding client application authentication helps when in establishing successful connections. When a client application requests access to the StorageGRID Webscale system, the system authenticates the request against the HTTP management settings that you created for the client application and completes the following steps: 1. The StorageGRID Webscale system checks that the client application is using the same IP address or range of IP addresses that are defined in the HTTP management settings. 2. When the client application passes the authentication process, the StorageGRID Webscale system opens a TCP/IP connection. Finding IP addresses for grid nodes You can find the IP address in the Network Management System (NMS) Management Interface (MI) for grid nodes that host the CLB or LDR services. You need the IP address to connect client applications to the CLB or LDR services. About this task You can also find IP addresses for grid nodes by using the SAID package. For details, see the StorageGRID Webscale 10.0 Installation Guide. Steps 1. In the NMS MI, expand Grid Topology. 2. In the Grid Topology tree, locate and expand the grid node to which you want to connect. The services for the selected grid node appear. 3. Expand the SSM service, click Resources, and scroll to the Network Addresses table. You can establish HTTP connections from client applications to any of the listed IP addresses.

25 Connecting client applications using CDMI 25 Related tasks Finding CDMI port numbers for the LDR and CLB services on page 25 Finding CDMI port numbers for the LDR and CLB services You can find port numbers for the LDR service and the CLB service by using the Network Management Service (NMS) Management Interface (MI). You need these port numbers to create an HTTP connection from client applications to the LDR service on storage nodes or to the CLB service on API Gateway Nodes. About this task To maintain system efficiency, you should use the default HTTP ports for their intended purposes. An ingest request sent to a retrieve port might fail if the StorageGRID Webscale system directs the query to an LDR service that is read only. As a StorageGRID Webscale system matures, LDR services fill up and become read only. When the StorageGRID Webscale system directs queries to an ingest port, the CLB service directs queries to resources that support both read and write operations, not resources that support read-only operations. The following ports are used for CDMI: Service Purpose CDMI port number CLB Query and retrieve 8080 Ingest 8081 LDR Query and retrieve Ingest Steps 1. In the NMS MI, select Grid Management > Grid Configuration > Storage > Main. 2. Scroll to the Ports table and locate the port numbers for the LDR and CLB services. How the StorageGRID Webscale system implements security in CDMI The StorageGRID Webscale system employs the use of Transport Layer Security (TLS) connection security, server authentication, client authentication, and client authorization. When considering

26 26 StorageGRID Webscale CDMI Implementation Guide security issues, you might find it helpful to understand how the StorageGRID Webscale system implements security, authentication, and authorization. The StorageGRID Webscale system accepts only HTTP commands submitted over a network connection that uses TLS to provide connection security, application authentication and, optionally, transport encryption. TLS enables the exchange of certificates as entity credentials and allows a negotiation that can use hashing and encryption algorithms. Server authentication uses server certificates signed by the grid's certificate authority (CA) certificate. The administrator might replace the system's certificate with a single, common server certificate applicable to all the API ports within the system. For details about configuring server certificates, see the Administration Guide. The following table lists security issues when using CDMI: Security issue Connection security Server authentication Client authentication Client authorization Client origin permissions CDMI TLS X.509 server certificate signed by grid CA or server certificate supplied by administrator Anonymous or client certificate (security partition) For CDMI, a client certificate (needed for security partitions) is supported only on nameless objects. Client profile permissions and object ownership A grid-wide command to disable the client's ability to delete can override client authorization. IP range Related information StorageGRID Webscale 10.0 Administrator Guide Configuring a custom server certificate When a client application establishes a TLS session to the StorageGRID Webscale system, the target LDR service sends a server certificate to the client application. By default, each LDR service identifies itself by using a separate certificate that is signed by the system Certificate Authority (CA). Rather than use separate server certificates, you can choose to use a single, server certificate supplied

27 Connecting client applications using CDMI 27 by you for all LDR services. This provides flexibility in enabling support for certificate hostname verification. About this task This configuration applies to SGAPI, CDMI, and S3 APIs. Only RSA custom server certificates are supported. The certificate and private key should be entered in PEM format. You can choose to use the wildcard certificate format: for example, *.storagegrid.mycompany.com. In this case, CLB services and LDR services must have DNS entries that map their IP addresses to host names that match the wildcards: for example, dc1- gw1.storagegrid.mycompany.com and dc2-s3.storagegrid.mycompany.com. Client applications are then configured to connect to the system using these DNS names, which enables host name verification. Steps 1. In the NMS MI, select Grid Management > Grid Configuration > Configuration > Main: 2. In the Custom Server Certificate box inside the API Server Certificates section, copy and paste the server certificate, including the

28 28 StorageGRID Webscale CDMI Implementation Guide -----BEGIN CERTIFICATE----- and the -----END CERTIFICATE----- encapsulation boundaries. 3. In the Custom Private Key box, copy and paste the corresponding private key, including the -----BEGIN RSA PRIVATE KEY----- and the -----END RSA PRIVATE KEY Ensure that this is an unencrypted private key. 4. Click Apply Changes. The private key becomes obscured. 5. Click Overview to see the custom certificate on the Overview page. Note: The CA Certificate box on the Overview page displays the default generated server certificate. 6. If a custom server certificate is issued by one or more intermediate CAs, you must also enter the certificates of all intermediate CAs within Grid Management > HTTP Management > Certificates > Certificate Authorities. For details about HTTP management, see the Administrator Guide. After you finish If you configured a custom server certificate, then clients should verify using the root CA certificate that issued the custom server certificate. However, if you use the default certificate, then client applications should verify connections using the system certificate. Reverting a custom server certificate to the default certificate You can change from using your custom server certificate back to using the default, automatically generated certificate. You might want to revert to the default certificate if, for example, the custom certificate has expired. About this task This configuration applies to SGAPI, CDMI, and S3 APIs. Steps 1. In the NMS MI, select Grid Management > Grid Configuration > Configuration > Main. 2. In the API Server Certificates section, delete the text from the Custom Server Certificate box.

29 Connecting client applications using CDMI Delete the text from the Custom Private Key box. 4. Click Apply Changes. 5. Click Overview to see the default certificate on the Overview page. After you finish You must reconfigure your client applications to use the default system CA certificate. Copying the StorageGRID Webscale system's CA certificate You can copy the StorageGRID Webscale system's certificate authority (CA) certificate from the Network Management System (NMS) Management Interface (MI) for client applications that require server verification. If a custom server certificate has been configured, then client applications should verify the server using the root CA certificate that issues the custom server certificate, rather than copy the CA certificate from the NMS MI. Steps 1. In the NMS MI, select Grid Management > Grid Configuration > Overview > Main. 2. Under API Server Certificates, expand CA Certificate. 3. Select the CA certificate. Include the -----BEGIN CERTIFICATE----- and the -----END CERTIFICATE----- in your selection.

30 30 StorageGRID Webscale CDMI Implementation Guide 4. Right-click the selected certificate, and then select Copy. How client applications use certificates for security in CDMI When a client application establishes a TLS session to the StorageGRID Webscale system, the system sends a server certificate to the client application for verification to ensure that the HTTP connection is secure. Understanding certificate use is important for system security. You can verify the server certificate by using the StorageGRID Webscale system's CA certificate. The client application should load the grid CA certificate and use it to verify that the client

31 application is communicating with the expected StorageGRID Webscale system. This process protects against man in the middle and impersonation attacks. Client applications can send client certificates to the StorageGRID Webscale system as part of session establishment. Related tasks Copying the StorageGRID Webscale system's CA certificate on page 29 Supported hashing and encryption algorithms for TLS libraries Client applications use the HTTP protocol to communicate with the StorageGRID Webscale system over a network connection that uses Transport Layer Security (TLS). The StorageGRID Webscale supports a limited set of hashing and encryption algorithms from the TLS libraries that client applications can use when establishing a TLS session. When you are setting up the communication processes, it is important for you to know which security algorithms the system uses. The StorageGRID Webscale system supports the following cipher suite security algorithms: AES128 SHA AES256 SHA NULL SHA NULL MD5 Based on system measurements and general security domain knowledge, AES128 SHA and AES256 SHA provide reasonable security without requiring inordinate amounts of computational resources. The choice between AES128 SHA and AES256 SHA depends on the client application requirements that balance performance with encryption security. Note: You should use one of the NULL ciphers if encryption is not required and you want to eliminate the overhead associated with encryption. The client application must explicitly request the NULL cipher. Choosing hash algorithms for data objects The StorageGRID Webscale system can use either SHA-1 or SHA secure hash algorithms to generate a hash for each data object stored in the StorageGRID Webscale system. You can choose the algorithm that best meets your security needs. About this task Connecting client applications using CDMI 31 The following table maps the choices in the NMS MI to the names of the hash algorithms: Algorithm choice in NMS MI SHA-256 Name of algorithm SHA bits

32 32 StorageGRID Webscale CDMI Implementation Guide Algorithm choice in NMS MI SHA-1 Name of algorithm SHA-1 Because you can change the algorithm, you might have data objects in the system with hashes generated by different algorithms. As a result, metadata for different data objects might include different algorithm names. The algorithm name associated with the data object depends on which algorithm was selected in the NMS MI when the data object was stored in the system. Steps 1. In the NMS MI, go to Grid Management > Grid Configuration > Main. 2. In the Stored Object Hashing option, select the hash algorithm for the StorageGRID Webscale system. 3. Click Apply Changes. How security partitions are used Security partitions are system-wide settings that provide you with a means to restrict access to ingested content. For instance, two client applications ingesting objects to the same system can be denied access each other's objects. If you use security partitions, consider how they are supported and how the StorageGRID Webscale system uses a certificate. Security partitions are supported only for nameless data objects, not for named data objects. If the client application is assigned to a security partition or if the client application's assigned HTTP profile requires certificate authentication, a certificate is required. This certificate must be loaded to the StorageGRID Webscale system as part of the configuration process. For more information and procedures to enable and configure security partitions, see the StorageGRID API Reference.

33 33 Testing client application connections to the system Using either Telnet or OpenSSL, you can test the HTTP connection between the client application and the StorageGRID Webscale system to ensure that the connection works. You can also test that the client application can store objects to and retrieve objects from the StorageGRID Webscale system. If you copy a command from this section and paste the command into another application, the copyand-paste process might remove dashes that appear between words near a line break. Ensure that the pasted command includes all dashes before you run the command. CDMI root URI The root URI for CDMI access to the StorageGRID Webscale system is IP_address:port/CDMI. You need the root URI when testing HTTP connections. For IP_address and port, you must use the IP address and port for the API Gateway Node that hosts the CLB service or the Storage Node that hosts the LDR service. Testing HTTP connections by using Telnet You can use a utility such as Telnet to test the HTTP connection between client applications and the StorageGRID Webscale system to ensure that the HTTP connection is correctly configured. Before you begin You have configured an IP address for the client application in the NMS MI. You know the IP address and port number for the API Gateway Node that hosts the CLB service or the Storage Node that hosts the LDR service. About this task You can connect the client application to the API Gateway Node that hosts the CLB service or the Storage Node that hosts the LDR service. Step 1. From a client application, use Telnet to connect to the CLB service or the LDR service: telnet IP_address port

34 34 StorageGRID Webscale CDMI Implementation Guide For IP_address and port, use the IP address and port for the API Gateway Node that hosts the CLB service or the Storage Node that hosts the LDR service. If you correctly configured the IP address for the client application in the NMS MI, a delay of several seconds occurs, and then the CLB service or the LDR service drops the connection. If you incorrectly configured the IP address for the client application in the NMS MI, the connection closes immediately. If the CLB service or the LDR service is not running or if a network error occurs, Telnet is unable to connect to the CLB service or the LDR service. Testing HTTP connections by using OpenSSL You can use the openssl command to test the HTTP connection between client applications and the StorageGRID Webscale system to ensure that the HTTP connection is correctly configured. Before you begin You have configured an IP address for the client application in the NMS MI. You know the IP address and port number for the API Gateway Node that hosts the CLB service or the Storage Node that hosts the LDR service. About this task You can connect the client application to the API Gateway Node that hosts the CLB service or the Storage Node that hosts the LDR service. Step 1. From a client application, establish an HTTP connection to the CLB service or the LDR service: openssl s_client -tls1 -connect IP_address:port For IP_address and port, you must use the IP address and port for the API Gateway Node that hosts the CLB service or the Storage Node that hosts the LDR service. If you correctly configured the IP address for the client application in the NMS MI, a connected response appears. If you incorrectly configured the IP address for the client application in the NMS MI, an error response appears. Retrieving CDMI capabilities with curl You can retrieve the CDMI capabilities of the StorageGRID Webscale system to determine which CDMI functions the StorageGRID Webscale system supports. Knowing the CDMI capabilities helps

StorageGRID Webscale 10.2

StorageGRID Webscale 10.2 StorageGRID Webscale 10.2 Cloud Data Management Interface Implementation Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:

More information

StorageGRID 9.0 CDMI Reference

StorageGRID 9.0 CDMI Reference StorageGRID 9.0 CDMI Reference NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 4-NETAPP Documentation comments:

More information

StorageGRID Webscale 10.0

StorageGRID Webscale 10.0 StorageGRID Webscale 10.0 Grid Designer User Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277 Web:

More information

StorageGRID Webscale 10.1

StorageGRID Webscale 10.1 StorageGRID Webscale 10.1 Grid Designer User Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277 Web:

More information

StorageGRID Webscale 10.3 Simple Storage Service Implementation Guide

StorageGRID Webscale 10.3 Simple Storage Service Implementation Guide StorageGRID Webscale 10.3 Simple Storage Service Implementation Guide September 2016 215-10825_A0 doccomments@netapp.com Table of Contents 3 Contents Support for the S3 REST API... 5 Changes to S3 REST

More information

StorageGRID Webscale 10.4 Swift Implementation Guide

StorageGRID Webscale 10.4 Swift Implementation Guide StorageGRID Webscale 10.4 Swift Implementation Guide April 2017 215-11701_A0 doccomments@netapp.com Table of Contents 3 Contents OpenStack Swift API support in StorageGRID Webscale... 4 History of Swift

More information

StorageGRID Webscale 10.2

StorageGRID Webscale 10.2 StorageGRID Webscale 10.2 Expansion Guide for OpenStack Deployments NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888)

More information

StorageGRID Webscale 11.0 Tenant Administrator Guide

StorageGRID Webscale 11.0 Tenant Administrator Guide StorageGRID Webscale 11.0 Tenant Administrator Guide January 2018 215-12403_B0 doccomments@netapp.com Table of Contents 3 Contents Administering a StorageGRID Webscale tenant account... 5 Understanding

More information

StorageGRID Webscale 11.0 Administrator Guide

StorageGRID Webscale 11.0 Administrator Guide StorageGRID Webscale 11.0 Administrator Guide January 2018 215-12402_C0 doccomments@netapp.com Table of Contents 3 Contents Understanding the StorageGRID Webscale system... 8 What the StorageGRID Webscale

More information

StorageGRID Webscale 10.3 Administrator Guide

StorageGRID Webscale 10.3 Administrator Guide StorageGRID Webscale 10.3 Administrator Guide September 2016 215-10810_A0 doccomments@netapp.com Table of Contents 3 Contents Understanding the StorageGRID Webscale system... 8 What the StorageGRID Webscale

More information

StorageGRID Webscale 10.4 Administrator Guide

StorageGRID Webscale 10.4 Administrator Guide StorageGRID Webscale 10.4 Administrator Guide April 2017 215-11695_A0 doccomments@netapp.com Table of Contents 3 Contents Understanding the StorageGRID Webscale system... 8 What the StorageGRID Webscale

More information

StorageGRID Webscale 10.0

StorageGRID Webscale 10.0 StorageGRID Webscale 10.0 Expansion Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277 Web: www.netapp.com

More information

StorageGRID Webscale 10.3 Troubleshooting Guide

StorageGRID Webscale 10.3 Troubleshooting Guide StorageGRID Webscale 10.3 Troubleshooting Guide September 2016 215-10828_A0 doccomments@netapp.com Table of Contents 3 Contents Overview of problem determination... 4 Defining the problem... 4 Assessing

More information

StorageGRID Webscale NAS Bridge Management API Guide

StorageGRID Webscale NAS Bridge Management API Guide StorageGRID Webscale NAS Bridge 2.0.3 Management API Guide January 2018 215-12414_B0 doccomments@netapp.com Table of Contents 3 Contents Understanding the NAS Bridge management API... 4 RESTful web services

More information

StorageGRID Webscale 10.2

StorageGRID Webscale 10.2 StorageGRID Webscale 10.2 Maintenance Guide for OpenStack Deployments NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

StorageGRID Webscale 10.4 Troubleshooting Guide

StorageGRID Webscale 10.4 Troubleshooting Guide StorageGRID Webscale 10.4 Troubleshooting Guide April 2017 215-11702_A0 doccomments@netapp.com Table of Contents 3 Contents Overview of problem determination... 4 Defining the problem... 4 Assessing the

More information

StorageGRID Webscale 11.0 Expansion Guide

StorageGRID Webscale 11.0 Expansion Guide StorageGRID Webscale 11.0 Expansion Guide January 2018 215-12399_B0 doccomments@netapp.com Table of Contents 3 Contents Expansion overview... 4 Planning and preparation... 5 Reviewing the options and

More information

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

StorageGRID Webscale 10.2

StorageGRID Webscale 10.2 StorageGRID Webscale 10.2 Troubleshooting Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277 Web: www.netapp.com

More information

Configuring the Cisco APIC-EM Settings

Configuring the Cisco APIC-EM Settings Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER1 This chapter describes how to configure health monitoring on the ACE to track the state of a server by sending out probes. Also referred to as out-of-band health monitoring, the ACE verifies the

More information

StorageGRID Webscale 11.1 Expansion Guide

StorageGRID Webscale 11.1 Expansion Guide StorageGRID Webscale 11.1 Expansion Guide October 2018 215-12800_B0 doccomments@netapp.com Table of Contents 3 Contents Expansion overview... 4 Planning and preparation... 5 Reviewing the options and

More information

UCS Manager Communication Services

UCS Manager Communication Services Communication Protocols, page 1 Communication Services, page 1 Non-Secure Communication Services, page 3 Secure Communication Services, page 5 Network-Related Communication Services, page 12 Communication

More information

StorageGRID Webscale 10.3 Software Installation Guide for OpenStack Deployments

StorageGRID Webscale 10.3 Software Installation Guide for OpenStack Deployments StorageGRID Webscale 10.3 Software Installation Guide for OpenStack Deployments September 2016 215-10818_A0 doccomments@netapp.com Table of Contents 3 Contents Deployment planning and preparation... 5

More information

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

Security context. Technology. Solution highlights

Security context. Technology. Solution highlights Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for

More information

Transport Level Security

Transport Level Security 2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,

More information

Comprehensive Setup Guide for TLS on ESA

Comprehensive Setup Guide for TLS on ESA Comprehensive Setup Guide for TLS on ESA Contents Introduction Prerequisites Requirements Components Used Background Information Functional Overview and Requirements Bring Your Own Certificate Update a

More information

ProxyCap Help. Table of contents. Configuring ProxyCap Proxy Labs

ProxyCap Help. Table of contents. Configuring ProxyCap Proxy Labs ProxyCap Help 2016 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and

More information

vcloud Director Tenant Portal Guide vcloud Director 8.20

vcloud Director Tenant Portal Guide vcloud Director 8.20 vcloud Director Tenant Portal Guide vcloud Director 8.20 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Cisco IOS HTTP Services Command Reference

Cisco IOS HTTP Services Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Security and Certificates

Security and Certificates Encryption, page 1 Voice and Video Encryption, page 6 Federal Information Processing Standards, page 6 Certificate Validation, page 6 Required Certificates for On-Premises Servers, page 7 Certificate Requirements

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate

More information

Encrypted Object Extension

Encrypted Object Extension Encrypted Object Extension ABSTRACT: "Publication of this Working Draft for review and comment has been approved by the Cloud Storage Technical Working Group. This draft represents a "best effort" attempt

More information

OnCommand Unified Manager

OnCommand Unified Manager OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2.1 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Transport Layer Security (TLS) Configuration Note

Transport Layer Security (TLS) Configuration Note E SBC Series VoIP Gateway Series MSBG Series Transport Layer Security (TLS) Configuration Note January 2012 Document # LTRT 31600 Configuration Note Contents Table of Contents 1 Overview... 7 1.1 AudioCodes

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Requirements for Threat Intelligence Director, page 4 How To Set Up, page 6 Analyze TID Incident

More information

Contents. Configuring SSH 1

Contents. Configuring SSH 1 Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list

More information

StorageGRID Webscale Installation Guide. For VMware Deployments. January _B0

StorageGRID Webscale Installation Guide. For VMware Deployments. January _B0 StorageGRID Webscale 11.0 Installation Guide For VMware Deployments January 2018 215-12395_B0 doccomments@netapp.com Table of Contents 3 Contents Installation overview... 5 Planning and preparation...

More information

WAP Security. Helsinki University of Technology S Security of Communication Protocols

WAP Security. Helsinki University of Technology S Security of Communication Protocols WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP

More information

Cisco IOS HTTP Services Command Reference

Cisco IOS HTTP Services Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Data Deduplication Metadata Extension

Data Deduplication Metadata Extension Data Deduplication Metadata Extension Version 1.1c ABSTRACT: This document describes a proposed extension to the SNIA Cloud Data Management Interface (CDMI) International Standard. Publication of this

More information

Validation Working Group: Proposed Revisions to

Validation Working Group: Proposed Revisions to Validation Working Group: Proposed Revisions to 3.2.2.4 Introduction Current Baseline Requirements For each Fully Qualified Domain Name listed in a Certificate, the CA SHALL confirm that, as of the date

More information

Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control)

Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control) Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control) Deployment Guide Cisco VCS X8.2 D14524.05 June 2014 Contents Introduction 3 Example network deployment 3 Network elements

More information

StorageGRID Webscale Installation Guide. For VMware Deployments. October _B0

StorageGRID Webscale Installation Guide. For VMware Deployments. October _B0 StorageGRID Webscale 11.1 Installation Guide For VMware Deployments October 2018 215-12792_B0 doccomments@netapp.com Table of Contents 3 Contents Installation overview... 5 Planning and preparation...

More information

WHITE PAPER. Authentication and Encryption Design

WHITE PAPER. Authentication and Encryption Design WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

Steel Belted Radius. Release Notes SBR 6.24 Build 1. Release, Build Published Document Version Build 1 May,

Steel Belted Radius. Release Notes SBR 6.24 Build 1. Release, Build Published Document Version Build 1 May, Steel Belted Radius Release Notes SBR 6.24 Build 1 Release, Build Published Document Version 6.24 Build 1 May, 2017 2.0 Contents Steel-Belted Radius Release - 6.2 Release Notes... 3 System Requirements...

More information

IP Addressing: IPv4 Addressing Configuration Guide, Cisco IOS Release 15S

IP Addressing: IPv4 Addressing Configuration Guide, Cisco IOS Release 15S IP Addressing: IPv4 Addressing Configuration Guide, Cisco IOS Release 15S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

User Manual. Admin Report Kit for IIS 7 (ARKIIS)

User Manual. Admin Report Kit for IIS 7 (ARKIIS) User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...

More information

StorageGRID Webscale Load Balancer Options

StorageGRID Webscale Load Balancer Options Technical Report StorageGRID Webscale Load Balancer Options Brian Atkins, Steve Pruchniewski, Yahshanulla Syedshaw, Steve Waltner, NetApp September 2017 TR-4626 Abstract This document helps you determine

More information

Configuring Virtual Servers

Configuring Virtual Servers 3 CHAPTER This section provides an overview of server load balancing and procedures for configuring virtual servers for load balancing on an ACE appliance. Note When you use the ACE CLI to configure named

More information

Content and Purpose of This Guide... 1 User Management... 2

Content and Purpose of This Guide... 1 User Management... 2 Contents Introduction--1 Content and Purpose of This Guide........................... 1 User Management........................................ 2 Security--3 Security Features.........................................

More information

Configuring Secure Socket Layer HTTP

Configuring Secure Socket Layer HTTP This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity

More information

Using SSL to Secure Client/Server Connections

Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating

More information

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking Objectives Describe methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

CS 393 Network Security. Nasir Memon Polytechnic University Module 12 SSL

CS 393 Network Security. Nasir Memon Polytechnic University Module 12 SSL CS 393 Network Security Nasir Memon Polytechnic University Module 12 SSL Course Logistics HW 4 due today. HW 5 will be posted later today. Due in a week. Group homework. DoD Scholarships? NSF Scholarships?

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide June, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

File Reputation Filtering and File Analysis

File Reputation Filtering and File Analysis This chapter contains the following sections: Overview of, page 1 Configuring File Reputation and Analysis Features, page 5 File Reputation and File Analysis Reporting and Tracking, page 14 Taking Action

More information

Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control)

Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control) Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control) Deployment Guide Cisco VCS X7.2 D14524.03 August 2012 Contents Introduction 3 Example network deployment 3 Internal

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Create Decryption Policies to Control HTTPS Traffic

Create Decryption Policies to Control HTTPS Traffic Create Decryption Policies to Control HTTPS Traffic This chapter contains the following sections: Overview of Create Decryption Policies to Control HTTPS Traffic, page 1 Managing HTTPS Traffic through

More information

Securing VMware NSX-T J U N E 2018

Securing VMware NSX-T J U N E 2018 Securing VMware NSX-T J U N E 2018 Securing VMware NSX Table of Contents Executive Summary...2 NSX-T Traffic [Control, Management, and Data]...3 NSX Manager:...7 NSX Controllers:...9 NSX Edge:...10 NSX-T

More information

Cisco Expressway Authenticating Accounts Using LDAP

Cisco Expressway Authenticating Accounts Using LDAP Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4

More information

User Manual. SSV Remote Access Gateway. Web ConfigTool

User Manual. SSV Remote Access Gateway. Web ConfigTool SSV Remote Access Gateway Web ConfigTool User Manual SSV Software Systems GmbH Dünenweg 5 D-30419 Hannover Phone: +49 (0)511/40 000-0 Fax: +49 (0)511/40 000-40 E-mail: sales@ssv-embedded.de Document Revision:

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Release Notes Version 8.1

Release Notes Version 8.1 Please Read Before Updating Before updating to a new firmware version, be sure to back up your configuration and read the release notes for each firmware version which you will apply. Do not manually reboot

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Securing Connections for IBM Traveler Apps. Bill Wimer STSM for IBM Collaboration Solutions December 13, 2016

Securing Connections for IBM Traveler Apps. Bill Wimer STSM for IBM Collaboration Solutions December 13, 2016 Securing Connections for IBM Traveler Apps Bill Wimer (bwimer@us.ibm.com), STSM for IBM Collaboration Solutions December 13, 2016 IBM Technote Article #21989980 Securing Connections for IBM Traveler mobile

More information

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof Dyadic Enterprise Unbound Key Control For Azure Marketplace The Secure-As-Hardware Software With a Mathematical Proof Unbound Key Control (UKC) is the first software-only key management and key protection

More information

Delegated Access Control Extension

Delegated Access Control Extension Delegated Access Control Extension Version 1.1f "Publication of this Working Draft for review and comment has been approved by the Cloud Storage Technical Working Group. This draft represents a "best effort"

More information

The State of TLS in httpd 2.4. William A. Rowe Jr.

The State of TLS in httpd 2.4. William A. Rowe Jr. The State of TLS in httpd 2.4 William A. Rowe Jr. wrowe@apache.org Getting Started Web references have grown stale Web references have grown stale Guidance is changing annually https://www.ssllabs.com/ssltest/analyze.ht

More information

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney. Overview of SSL/TLS Luke Anderson luke@lukeanderson.com.au 12 th May 2017 University Of Sydney Overview 1. Introduction 1.1 Raw HTTP 1.2 Introducing SSL/TLS 2. Certificates 3. Attacks Introduction Raw

More information

Configuring Secure Socket Layer HTTP

Configuring Secure Socket Layer HTTP This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity

More information

How to Configure TLS with SIP Proxy

How to Configure TLS with SIP Proxy This article provides steps to configure SIP with TLS encryption in an example scenario where the telephone is located in a different network from that of the PBX. The Barracuda NextGen Firewall F-Series

More information

Sentry Power Manager (SPM) Software Security

Sentry Power Manager (SPM) Software Security Sentry Power Manager (SPM) Software Security Purpose This technical note is a detailed review of the security areas of the SPM enterprise software product, version 6.0 and greater, and provides a brief

More information

Configuring Secure Socket Layer HTTP

Configuring Secure Socket Layer HTTP Finding Feature Information, page 1 Information about Secure Sockets Layer (SSL) HTTP, page 1 How to Configure Secure HTTP Servers and Clients, page 5 Monitoring Secure HTTP Server and Client Status, page

More information

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode This chapter contains the following sections: Overview, on page 1 Configuration Changes in FIPS Mode, on page 1 Switching the Appliance to FIPS Mode, on page 2 Encrypting Sensitive Data in FIPS Mode, on

More information

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2. P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Nasuni Data API Nasuni Corporation Boston, MA

Nasuni Data API Nasuni Corporation Boston, MA Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,

More information

Defining IPsec Networks and Customers

Defining IPsec Networks and Customers CHAPTER 4 Defining the IPsec Network Elements In this product, a VPN network is a unique group of targets; a target can be a member of only one network. Thus, a VPN network allows a provider to partition

More information

Intercepting Web Requests

Intercepting Web Requests This chapter contains the following sections: Overview of, on page 1 Tasks for, on page 1 Best Practices for, on page 2 Web Proxy Options for, on page 3 Client Options for Redirecting Web Requests, on

More information

Infoblox Authenticated DHCP

Infoblox Authenticated DHCP Infoblox Authenticated DHCP Unified Visitor Management amigopod Technical Note Revision 1.1 5 July 2010 United States of America +1 (888) 590-0882 Europe, Middle East & Asia +34 91 766 57 22 Australia

More information

Advanced iscsi Management April, 2008

Advanced iscsi Management April, 2008 April, 2008 Gene Nagle, istor Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and

More information

Configuring F5 for SSL Intercept

Configuring F5 for SSL Intercept Configuring F5 for Welcome to the F5 deployment guide for configuring the BIG-IP system for SSL intercept (formerly called with Air Gap Egress Inspection). This document contains guidance on configuring

More information

Configuring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0. Issue th October 2009 ABSTRACT

Configuring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0. Issue th October 2009 ABSTRACT Avaya CAD-SV Configuring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0 Issue 1.0 30th October 2009 ABSTRACT These Application Notes describe the steps to configure the Cisco VPN 3000 Concentrator

More information

How to Configure TLS with SIP Proxy

How to Configure TLS with SIP Proxy This article provides steps to configure SIP with TLS encryption in an example scenario where the telephone is located in a different network from that of the PBX. The Barracuda NG Firewall performs NAT

More information

How to Set Up VPN Certificates

How to Set Up VPN Certificates For the VPN service, you can use either self-signed certificates or certificates that are generated by an external CA. In this article: Before You Begin Before you set up VPN certificates, verify that

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Security in Network Layer Implementing security in application layer provides flexibility in security

More information