Overview of AltaVault....................................................................................................................................11
Supported backup applications and cloud destinations ...........................................................................11
Chapter 3 - Using the AltaVault configuration wizards.........................................................................17
Using the AltaVault appliance CLI configuration wizard ..............................................................................17
Using the Management Console.....................................................................................................................18
Connecting to the Management Console.................................................................................................18
Home page...............................................................................................................................................19
Navigating in the Management Console .................................................................................................19
Getting help .............................................................................................................................................20
Using the Wizard Dashboard..........................................................................................................................20
Accessing the wizard dashboard .............................................................................................................21
Using the System Settings wizard ...........................................................................................................21
Using the Cloud Settings wizard .............................................................................................................22
Using the import configuration wizard ...................................................................................................33
Using the export configuration wizard....................................................................................................34
Modifying general host settings .....................................................................................................................51
Modifying data interfaces ..............................................................................................................................54
Configuring date and time ..............................................................................................................................65
Configuring general security settings .............................................................................................................79
Managing user permissions ...........................................................................................................................81
Configuring permissions for user roles .........................
Unlocking the secure vault .............................................................................................................................89
Configuring Web settings ..............................................................................................................................90
Managing web SSL certificates...............................................................................................................91
Chapter 8 - Configuring AltaVault appliances for FIPS-compliant cryptography............................. 103
What is FIPS? ...............................................................................................................................................103
Understanding FIPS on AltaVault ................................................................................................................103
Telnet server ..........................................................................................................................................110
Web proxy .............................................................................................................................................110
Disabling FIPS mode....................................................................................................................................111
Verifying FIPS mode in system logs ............................................................................................................ 111
Verifying that file transfers operate in FIPS mode .............
Verifying that NTP operates in FIPS mode ...........................................................................................112
Verifying that secure vault operates in FIPS mode ...............................................................................112
Verifying that SNMP operates in FIPS mode........................................................................................112
Verifying that the web interface operates in FIPS mode .......................................................................112
FIPS CLI.......................................................................................................................................................112
Chapter 9 - Managing the AltaVault appliance..................................................................................... 113
Starting and stopping the AltaVault appliance..............................................................................................113
Configuring scheduled jobs .........................................................................................................................114
Model upgrades on the virtual AltaVault appliances.............................................................................117
Upgrading your software ..............................................................................................................................117
Rebooting and shutting down AltaVault appliance ......................................................................................118
Viewing the current user settings..................................................................................................................119
Chapter 10 - Viewing reports and logs ................................................................................................. 121
About reports ................................................................................................................................................122
Viewing the storage optimization report.......................................................................................................125
Viewing the front-end throughput report......................................................................................................126
Viewing the back-end throughput report ......................................................................................................127
Viewing the eviction report ..........................................................................................................................128
Viewing the replication report......................................................................................................................129
Viewing the cloud operations report.............................................................................................................130
Generating system dumps.............................................................................................................................145
Viewing process dumps................................................................................................................................146
Capturing and uploading TCP dumps .............................................................................................
.............146
Viewing a TCP dump ............................................................................................................................151
Viewing the appliance monitoring report.....................................................................................................152
Viewing the shelf details...............................................................................................................................154
Viewing the storage RAID group .................................................................................................................155
Viewing offline file system check page ........................................................................................................155
Viewing online file system check page ........................................................................................................156
Contents
Beta Draft
Viewing the verify tool diagnostics ..............................................................................................................157
Chapter 11 - Transferring data to the cloud using Amazon Snowball............................................... 159
Amazon S3 or S3-IA to Glacier migration...................................................................................................167
Amazon S3 to S3-IA or Amazon S3-IA to S3 migration.............................................................................168
Chapter 13 - Migrating data between appliances ................................................................................169
Data migration overview ..............................................................................................................................169
Data migration connection diagrams............................................................................................................170
Data migration process .................................................................................................................................172
System chassis specifications................................................................................................................184
What you need to know about expansion shelves .................................................................................184
Using LEDs to check the status of the system..............................................................................................185
Field replaceable units ..................................................................................................................................187
Slot numbering and associated components..........................................................................................188
Fan modules and their LEDs ........................................................................................................................188
Fan redundancy policy ..........................................................................................................................190
Power supplies and their LEDs ....................................................................................................................191
Power supply LED behaviors................................................................................................................191
Controller components and their LEDs ........................................................................................................193
Controller LED behaviors .....................................................................................................................193
Installing a controller in a chassis.................................................................................................................206
Replacing a controller chassis ......................................................................................................................208
Hot-swapping controller fan modules ..........................................................................................................209
Hot-swapping controller power supplies ......................................................................................................212
Changing the shelf ID for a disk shelf..........................................................................................................215
Adding an additional RAID group to a configured appliance......................................................................216
Replacing a faulty hard disk drive on an AltaVault AVA400 or AVA800 appliance....................................218
Replacing the RTC clock coin battery..........................................................................................................227
Replacing disk shelf power supplies and other FRUs ..................................................................................230
Returning failed parts ...................................................................................................................................230
Disposing of batteries ...................................................................................................................................230
Contents
Beta Draft
Appendix A - Administrator’s configuration worksheet .....................................................................231
IAM policies for AltaVault ...........................................................................................................................247
Sample of IAM policy...........................................................................................................................248
Bucket policies for AltaVault .......................................................................................................................249
Sample of bucket policy ........................................................................................................................249
Appendix D - Best practices for Amazon Glacier ................................................................................251
Optimizing data movement to and from Amazon Glacier............................................................................251
Protecting data to Amazon Glacier...............................................................................................................251
Recovering data from Amazon Glacier ........................................................................................................252
Restoring data from the cloud using the prepopulation page ................................................................252
Restoring data from the cloud using the command-line interface.........................................................254
How to Send Your Comments ...............................................................................................................269
Index ........................................................................................................................................................ 271
Contents
Beta Draft
Beta Draft
CHAPTER 1Introduction of NetApp AltaVault
Cloud Integrated Storage
Overview of AltaVault
AltaVault appliance is a disk-to-disk data storage optimization system with unique cloud storage integration. There are
three types of AltaVault deployments:
Physical hardware appliances, available in AVA400 and AVA800 models.
Virtual appliance, available in AVA-v2, AVA-v8, AVA-v16, and AVA-v32 models.
Cloud-based virtual appliance:
–Amazon Machine Images (AMI), available in AVA-c4, AVA-c8, and AVA-c16 models.
–Microsoft Azure Virtual Machine (AVM), available in the AVA-c4 model.
Supported backup applications and cloud destinations
Refer to the Interoperability Matrix Tool (IMT) on the NetApp Support site to validate that the product and versions
that can be used to construct configurations that are supported by NetApp. Specific results depend on each customer's
installation in accordance with published specifications.
AutoSupport
AltaVault supports user-triggered and daily AutoSupports (ASUPs) as well as certain event-based triggers. ASUP
functionality is supported on all AltaVault models. For event-based triggers, see “Viewing the alarm status report” on
page 133.
For more information on ASUP CLI commands, see the NetApp AltaVault Cloud Integrated Storage Command-Line Interface Reference Guide.
System requirements and specifications
This section specifies the hardware and software requirements.
For system requirements for virtual appliances, see the NetApp AltaVault Cloud Integrated Storage Installation and
AltaVault is supported with the backup applications and cloud storage providers identified by the IMT
(interoperability matrix tool)
Refer to the Interoperability Matrix Tool (IMT)
feature versions described in this document are supported for your specific environment. The NetApp IMT
defines the product components and versions that can be used to construct configurations that are supported by
NetApp. Specific results depend on each customer's installation in accordance with published specifications.
An AltaVault can only be pointed to one cloud storage provider at a time.
If an existing AltaVault needs to be pointed to a different cloud storage provider than the one currently
configured, you must clear the AltaVault cache before reconfiguring the new cloud storage provider credentials.
All existing data associated with the previous cloud storage provider will remain.
on the NetApp Support site to validate that the exact product and
Deploying the AltaVault applianceDeployment guidelines
Beta Draft
AltaVault can be deployed in one of two modes: Backup mode or Cold Storage mode. Once deployed, you cannot
change the mode. Use the following table to make a comparison of using AltaVault in backup mode versus cold
storage mode:
ModesProsCons
Backup mode• Allows access to the most recent backups on cache.
• Allows global deduplication of all data received by
AltaVault, leading to higher deduplication rates.
• Maximizes data movement efficiency of the WAN
through deduplication of data.
• Cache expansion capability via add on shelves allows for
growth as needed by the business.
• Higher ingest performance than Cold Storage mode.
Cold storage mode• Protects archive workloads for long periods of time,
typically to cool or cold cloud storage tiers.
• Allows access to far greater cloud capacity (Up to 10PB of
storage, based on 1.333 billion files of 100MB average
file size).
• Provides expansive long term storage in just one head
controller unit.
You can configure AltaVault folder shares to help describe a policy target.
• Cloud capacity managed
limited to a maximum of up to
5 times the usable space on the
AltaVault’s disk cache.
• Minimal deduplication
compared to backup mode.
• Limited network and WAN
performance, dependent on
average, file size of objects
sent to AltaVault.
• Only available on AVA-400
48 TB and virtual models.
• No expansion capability with
shelves.
• Restores are always from the
cloud provider.
For example, you can configure a backup application to direct critical system backups to point to a specific folder
on one AltaVault data connection, while noncritical backups might be directed by a backup application to point to
another folder on another AltaVault data connection. This method helps balance priorities of data over the
network and organize data for recovery in case of a disaster. If possible, organize your backup policies to drive
similar data to the same AltaVault unit.
For example, if you are backing up a Windows server farm to multiple AltaVault appliances, operating system
backups are likely to have the best deduplication rates when grouped together to the same AltaVault. File and
application server backups obtain better deduplication when grouped together as well.
AltaVault exports its configuration to a file called altavault_config_(HOSTNAME)_(DATETIME).tgz.
NetApp recommends that you store the configuration file in different physical locations. The configuration file
contains information about the configuration, including the encryption key. Alternatively, you can just export the
encryption key alone.
Note: To access the encrypted data, you need an encryption key. If you lose the encryption key, AltaVault cannot reconstitute the
encrypted data.
“Using the export configuration wizard” on page 34
Deploying the AltaVault applianceAdvanced configuration
Beta Draft
Advanced configuration
The following table summarizes AltaVault’s advanced configuration options.
Configuration optionSettingReference
Storage settingsAdvanced storage settings for
Security settingsSet authentication method, Active
System administration
settings
System monitoringViewing reports and logsChapter 10, “Viewing reports and logs”
SMB, NFS, OST, and SnapMirror
Configure data prepopulation“Restoring data from the cloud using the prepopulation page”
Directory (AD) administration,
role-based permissions for users,
Secure Vault, web settings, REST
API access, key management
(KMIP), management ACLs
Configure FIPS complianceChapter 8, “Configuring AltaVault appliances for FIPS-
Set announcements, alarms, date
and time, SNMP, email
notifications, log settings
System monitoring
• Schedule jobs
• Schedule reports
• LEDs (AVA-400, AVA-800
only)
Peer monitoring“Configuring appliance monitoring” on page 97
Chapter 4, “Configuring storage settings”
on page 252
Chapter 7, “Configuring security settings”
compliant cryptography”
Chapter 6, “Configuring system administrator settings”
“Configuring scheduled jobs” on page 114
“Viewing schedule reports” on page 131
“Using LEDs to check the status of the system” on page 185
Configuration recovery
In the event of a catastrophic event, it might be necessary to recover your configuration if previously saved to another
location using the Export Wizard. To recover a saved configuration, see
“Using the AltaVault appliance CLI configuration wizard” on page17
“Using the Management Console” on page 18
“Using the Wizard Dashboard” on page 20
Using the AltaVault appliance CLI configuration wizard
After installing the AltaVault appliance and logging in for the first time, you are prompted to enter initial system
information using command-line interface (CLI).
To run the AltaVault appliance CLI configuration wizard
1. Complete the configuration wizard steps on the client side and server side.
Wizard promptDescriptionExample
Step 1: Admin password?NetApp requires that you change the default
administrator password (
The new password must be a minimum of eight
characters and cannot be the word password.
Step 2: Host name?Enter the host name for the AltaVault appliance.Step 2: Hostname? amnesiac
Step 3: Use DHCP on the
primary interface?
Step 4: Primary IP address?Enter the IP address.Step 4: Primary IP address?
Step 5: Netmask?Enter the netmask address.Step 5: Netmask? 255.255.0.0
Step 6: Default gateway?Enter the default gateway.St ep 6: D efau lt gateway?
For AltaVault virtual and physical appliances,
DHCP is not recommended. For AltaVault cloudbased virtual appliances, DHCP is required.
Using the AltaVault configuration wizardsUsing the Management Console
Beta Draft
Wizard promptDescriptionExample
Step 7: Primary DNS server?Enter the primary DNS server IP address. If you do
not specify a valid DNS server, the system does not
start.
Step 8: Domain name?Enter the domain name for the network that the
appliance is connected to.
If you set a domain name, you can enter host names
in the system without the domain name.
Step 7: Primary DNS server?
10.0.0.2
Step 8: Domain name?
example.com
2. To change an answer, enter the step number to return to. Otherwise press <enter> to save changes and exit. The
AltaVault appliance configuration wizard automatically saves your configuration settings. The CLI prompt
appears:
amnesiac>
If you chose to use DHCP, you can get the IP address of the appliance by running the following commands:
3. To log out of the system, enter exit at each of the command-level prompts.
You can now log in to the appliance using a web-based client to access the Management Console (user interface) and
Wizard Dashboard for configuring system and cloud service provider (CSP) settings.
Using the Management Console
This section includes the following information:
“Connecting to the Management Console” on page 18
“Home page” on page 19
“Navigating in the Management Console” on page 19
Connecting to the Management Console
To connect to the AltaVault Management Console
1. Enter the URL for the Management Console in the location box of your Web browser:
https://<host>.<domain>
When you connect using HTTPS, you are prompted to inspect and verify the SSL certificate. The SSL certificate
is a self-signed certificate used to provide encrypted Web connections to the Management Console. It is recreated when the appliance hostname is changed and when the certificate has expired.
The <host> variable is the hostname you assigned to the AltaVault primary interface in the configuration wizard.
If your DNS server maps that IP address to a name, you can specify the DNS name.
The <domain> variable is the full domain name for the appliance.
You can also specify the IP address instead of the host and domain name.
2. In the Username text box, specify the user login. The default login is admin.
Using the Management ConsoleUsing the AltaVault configuration wizards
Beta Draft
3. In the Password text box, specify the password you assigned in the CLI configuration wizard of the AltaVault. The
password cannot be “password.” To change your password, see
“Viewing the current user settings” on page 119.
4. Click Sign In to display the AltaVault configuration wizard (when you log in for the first time) or the Home page
(for subsequent logins).
Home page
The Home page displays the following parameters:
Cloud and Disk Storage Allocation - The outer circle represents the cloud storage and the inner circle represents
the local AltaVault cache storage. This section also lists the used storage, free storage, and total storage on the
cloud and the disk.
Optimization Service - Specifies whether the Storage Optimization Service is running or has stopped and the
status of the service:
StatusDescription
ReadyStorage Optimization Service is ready to ingest and replicate data to the cloud.
Not readyStorage Optimization Service is unavailable. No data will be ingested or replicated.
ReplayingStorage Optimization Service has been terminated during backup replication, either due to loss of power or
a crash. During this replay process, the AltaVault verifies data consistency from its transaction logs.
The amount of time it takes to replay process to complete will depend on the amount of data in flight at the
time the AltaVault appliance was abnormally stopped.
UpgradingStorage Optimization Service is unavailable due to an in-progress upgrade. No data will be ingested or
replicated.
Cloud Storage Reclamation - Provides the completion percentage of the cloud storage reclamation service
(garbage collection). This service runs automatically when needed to clean up fragmented disk and cloud space.
Alarms Triggered - Displays the appliance health status and software update. To view the alarms triggered,
choose Reports > Alarm Status.
System Status - Displays details such as the AltaVault time, system up time, and optimization service up time.
Appliance Information - Provides the appliance hostname and its model number.
Replicated Data - Displays the status of the process of copying data and metadata from the AltaVault to the cloud.
Storage Optimization - Displays the expanded data, deduplicated data, and deduplication factor. Expanded data is
the data that has been backed up locally by the AltaVault. Deduplicated data reflects data that has been optimized
through the use of deduplication and compression. Deduplication factor is the ratio of the expanded data and total
optimized data. The total optimized data includes both deduplication and compression savings.
Cloud Information - Displays the status of the cloud connection that the appliance is configured to communicate
with.
Navigating in the Management Console
You navigate to the tools and reports available to you in the Management Console using cascading menus.
Using the AltaVault configuration wizardsUsing the Wizard Dashboard
Beta Draft
Saving your configuration
As you apply configuration settings, the values are applied to the running configuration. Most Management Console
configuration pages include an Apply button for you to commit your changes. When you click Apply, the Management
Console updates the running configuration.
NetApp recommends that you export your configuration after every change.
A red asterisk next to a control indicates that the field is required. You must specify a valid entry for all of the required
controls on a page before saving the changes.
Restarting AltaVault appliance service
Some configuration settings require a restart the services in order for the changes to take effect.
To restart the service, click Restart to display the Service page or go to Storage Optimization Service page and restart
the service.
Printing pages and reports
You can print Management Console pages and reports using the print option on your Web browser.
To print pages and reports
Choose File > Print in your Web browser to open the Print dialog box.
Getting help
The Help page provides the following options:
Online Help - View browser-based online help.
Technical Support - View links and contact information for NetApp Support.
Appliance Details - View appliance information such as the model number, hardware revision type, serial
number, and software version currently installed on the appliance.
Displaying online help
The Management Console provides page-level help for the appliance.
To display online help
Click the question mark icon next to the page title. The help for the page appears in a new browser window.
Logging out
In the menu bar, click Sign out to end your session.
Using the Wizard Dashboard
The AltaVault configuration wizard appears only after you log in to the appliance for the first time. It enables you to
access other configuration wizards, so that you can configure your own system settings, configure cloud settings, and
import and export settings.
Using the Wizard DashboardUsing the AltaVault configuration wizards
Beta Draft
Google Cloud Storage - see “Configuring Google Cloud Storage” on page 27
HGST Storage - see “Configuring S3-based storage” on page 30
Internet Initiative Japan (IIJ) - see “Configuring S3-based storage” on page 30
Microsoft Windows Azure Storage - see “Configuring Microsoft Windows Azure storage” on page 29
NetApp StorageGRID Webscale - see “Configuring S3-based storage” on page 30
OpenStack Object Storage (Swift) - see “Configuring SWIFT-based storage” on page 30
Oracle Storage Cloud Service - Object Storage - see “Configuring SWIFT-based storage” on page 30
Outscale On-Demand Storage - see “Configuring S3-based storage” on page 30
Rackspace Cloud Files - see “Configuring Swift-based storage with region-selection” on page 32
S3 Compliant Connector - see “Configuring S3-based storage” on page 30
Scality RING - see “Configuring S3-based storage” on page 30
SoftLayer Object Storage (Swift) - see “Configuring Swift-based storage with region-selection” on page 32
Swisscom Dynamic Storage- see “Configuring Atmos-based storage” on page 26
Verizon Cloud Storage - see “Configuring S3-based storage” on page 30
4. Configure Encryption Settings in the Wizard Dashboard. This page is only available to users with Read-Only
Security Settings permissions or Read and Write Security Settings permissions. Specify the following items:
Control Description
Create New Datastore Encryption KeySelect this option to establish a new AES-256 bit encryption key that
AltaVault uses to secure data.
Set Key Passphrase - Optionally, specify a passphrase that will be used to
secure the encryption key on AltaVault. This passphrase will be required
when importing the encryption key or AltaVault configuration onto a new
AltaVault appliance. The passphrase is not stored within a configuration
archive and must be kept in a secure location.
Confirm Key Passphrase - Confirm the passphrase.
Import Key from FileSelect this option to import the key from a file. Select the file to import it
onto the appliance. The key must be the key that was generated by an
AltaVault appliance.
Import Key from TextSelect this option to import the key from text. The key must be the key that
was generated or exported from an AltaVault appliance.
5. On the Confirmation page verify the information, and click Save and Apply.
Note: It is recommended to use a firewall to prevent unauthorized connections to the AltaVault.
Using the AltaVault configuration wizardsUsing the Wizard Dashboard
Beta Draft
Configuring Amazon Glacier storage
1. Select yes or no to use keys from KMIP server from the drop-down list. When configuring the KMIP server, you
must:
–Use the same username and password as created in KMS.
–Upload the same certificate as downloaded from KMS after signing it.
–Add a symmetric key (KMIP key) as the encryption key.
–Add a secret data key (KMIP key) for each of the authentication fields.
2. Specify the Region. You can choose to store your data in the Amazon Glacier Region that meets your regulatory,
throughput, and geographic redundancy criteria.
When specifying US East (N. Virginia) or us-east-1 as the region, use US Standard.
3. Custom Region - Optionally, specify the custom region for your cloud service provider account.
4. Authentication Method - Specify one of the following:
Standard - Specify selections for the “Standard authentication” on page 24.
STS - Specify selections for the “STS authentication” on page 25.
Note: If user files are not cached on AltaVault, they should be pre-populated before reads are performed. This is because restores
from Amazon Glacier have a latency of up to 12 hours depending on the retrieval option. For more information, see AWS
documentation.
Standard authentication
Note: When S3 or Glacier is configured and Storage Optimization Service fails to start, the logs may contain the error
“BucketAlreadyExists: The requested bucket name is not available. The bucket namespace is shared by all users of the system.
Please select a different name and try again.” This indicates that the chosen bucket name is not available. You can resolve this by
selecting a different bucket name. This error may also be encountered after a cloud migration or changing of the cloud settings. One
possible reason may be that the cloud credentials do not belong to the account that owns the bucket. Double-check the credentials
and ensure that the correct credentials are entered on the Cloud Settings page.
For the Standard authentication type, make selections for the following:
1. Access Key - Specify the access key for your Amazon S3 (AWS) account.
2. Secret Key - Specify the secret key for your cloud service provider account.
3. Hostname - Verify the hostname of the cloud provider on which AltaVault stores the replicated data.
4. Bucket Name - Specify the bucket name associated with your cloud service provider account. If the bucket name
does not exist, the bucket is created during initial
more labels separated by a period
AltaVault replication. Bucket names must be a series of one or
5. Port - Specify the port through which replication occurs. Ports 80 or 443 are available.
Using the Wizard DashboardUsing the AltaVault configuration wizards
Beta Draft
6. Enable Archiving - Enable this option if you are using the AltaVault for cold storage mode. For more information
about cold storage mode, see “Deployment guidelines” on page 13.
7. Enable Cloud Deduplication - Enabling this option may improve deduplication rates for repetitive backup datasets,
lowering cloud storage costs. Disabling this option is recommended for Amazon Glacier to improve recovery of
recently written data from cache, but can decrease deduplication rates and increase cloud storage costs.
8. Enable Cloud CA Certificate - Optionally, specify a cloud CA certificate that will be used to validate the server
certificate of cloud provider. This must be .pem extension file.
9. Enable Proxy - Select to enable proxy server settings. A proxy server acts as an intermediary for requests from
clients seeking resources from other servers.
After you select the check box, specify the following settings:
Hostname/IP address - Specify the hostname or the IP address
Port - Specify the port numbers for access
Username - Specify the name of the user for access
Password - Specify the user’s password.
STS authentication
1. Identity Provider URL: Specify the URL of the provider.
The identity provider is a server that performs two roles: 1) authenticating users and machines wishing to access
Amazon AWS services, and 2) providing temporary security credentials with which to access those services.
AltaVault makes a call to the identity provider, which in turn makes a call to Amazon STS using the AssumeRole
API call to generate temporary security credentials, and then passes these credentials back to AltaVault.
2. Parameters - Specify the parameters that the provider expects to authenticate the AltaVault appliance.
3. Response Type - JSON is the default.
4. Method - Select GET or POST.
5. CA Certificate - Specify the certificate that will be used to validate the server certificate of the identity provider.
Ensure that the file has the required .pem extension.
6. Select the Web Settings page link.
Select the Replace tab.
Certificate - Upload the client certificate.
Separate Private Key - Upload the Private Key.
To replace the certificate and private key, click Import Certificate and Key.
7. Hostname - Verify the hostname of the cloud provider on which AltaVault stores the replicated data.
8. Bucket Name - Specify the bucket name associated with your cloud service provider account. If the bucket name
does not exist, the bucket is created during initial
AltaVault replication. Bucket names must be a series of one or
more labels separated by a period.
9. Port - Specify the port through which replication occurs. Ports 80 or 443 are available.
Using the AltaVault configuration wizardsUsing the Wizard Dashboard
Beta Draft
10. Enable Archiving - Enable this option if you are using the AltaVault for cold storage mode. For more information
about cold storage mode, see “Deployment guidelines” on page 13.
11. Enable Cloud Deduplication - Enabling this option may improve deduplication rates for repetitive backup datasets,
lowering cloud storage costs. Disabling this option is recommended for Amazon Glacier to improve recovery of
recently written data from cache, but can decrease deduplication rates and increase cloud storage costs.
12. Enable Cloud CA Certificate - Optionally, specify a cloud CA certificate that will be used to validate the server
certificate of cloud provider. This must be .pem extension file.
13. Select the Enable Proxy check box to enable proxy server settings and specify:
Hostname/IP address - Specify the hostname or the IP address
Ports - Specify the port numbers for access
Username - Specify the name of the user for access
Password - Specify the user’s password
Configuring Amazon S3 storage
1. Select yes or no to use keys from KMIP server from the drop-down list. When configuring the KMIP server, you
must:
–Use the same username and password as created in KMS.
–Upload the same certificate as downloaded from KMS after signing it.
–Add a symmetric key (KMIP key) as the encryption key.
–Add a secret data key (KMIP key) for each of the authentication fields.
2. Specify the Region.You can choose an Amazon S3 region to optimize for latency, minimize costs, or address
regulatory requirements.
3. Custom Region - Optionally, specify the custom region for your cloud service provider account.
4. Storage Class - Specify a storage class from the drop-down list:
Standard (Standard storage class)
Standard-IA (Standard Infrequent Access)
RRS (Reduced Redundancy Service)
5. Authentication Type - Specify one of the following:
Standard - Specify selections for the “Standard authentication” on page 24.
STS - Specify selections for the “STS authentication” on page 25.
Configuring Atmos-based storage
1. Select yes or no to use keys from KMIP server from the drop-down list. When configuring the KMIP server, you
must:
–Use the same username and password as created in KMS.
–Upload the same certificate as downloaded from KMS after signing it.
Using the Wizard DashboardUsing the AltaVault configuration wizards
Beta Draft
–Add a symmetric key (KMIP key) as the encryption key.
–Add a secret data key (KMIP key) for each of the authentication fields.
2. If your provider is AT&T, specify the following settings:
Storage Policy - Select one of the following storage policies from the drop-down list:
Local Replication - Stores data stored in one location and protects it using erasure coding.
Remote Replication - Stores data in two locations maintains a copy in one data center and replicates it to a
geographically remote data center.
3. Specify the following settings:
Subtenant ID - Specify the subtenant ID that EMC Atmos uses to authenticate each request.
UID - Specify the user ID that EMC Atmos uses to authenticate each request.
Shared Secret - Specify the shared secret that EMC Atmos uses to authenticate each request. When the client
application builds a Web service request, EMC Atmos uses the shared secret to create a signature entry as a
part of the request. The shared secret must be associated with the subtenant ID and application ID created by
the EMC Atmos-based storage provider.
4. Specify the hostname.
5. Specify the bucket name associated with your cloud service provider account. You can use buckets to organize
your data and control access to your data, but they cannot be nested. If the bucket name does not exist, the bucket
is created during initial
AltaVault replication.
6. Specify the port number.
7. Enable Archiving - Enable this option if you are using the
AltaVault for cold storage mode. For more information
about cold storage mode, see “Deployment guidelines” on page 13.
8. Enable Cloud Deduplication - Enabling this option may improve deduplication rates for repetitive backup datasets,
lowering cloud storage costs. Disabling this option is recommended for Amazon Glacier to improve recovery of
recently written data from cache, but can decrease deduplication rates and increase cloud storage costs.
9. Enable Cloud CA Certificate - Optionally, specify a cloud CA certificate that will be used to validate the server
certificate of cloud provider. This must be .pem extension file.
10. Select the Enable Proxy check box to enable proxy server settings and specify:
Hostname/IP address - Specify the hostname or the IP address.
Ports - Specify the port numbers for access.
Username - Specify the name of the user for access.
Password - Specify the user’s password.
Configuring Google Cloud Storage
1. Select yes or no to use keys from KMIP server from the drop-down list. When configuring the KMIP server, you
must:
–Use the same username and password as created in KMS.
–Upload the same certificate as downloaded from KMS after signing it.
Using the AltaVault configuration wizardsUsing the Wizard Dashboard
Beta Draft
–Add a symmetric key (KMIP key) as the encryption key.
–Add a secret data key (KMIP key) for each of the authentication fields.
2. Specify the Location from the drop-down list.
3. Storage Class - Specify the storage class from the drop-down list:
–Standard (Standard storage class)
–Nearline
4. Project ID - Specify the unique project ID associated with the bucket.
5. Client email - Specify the service account email address value from the API Manager > Credentials page of the
Google developers console.
6. Private Key - Select Browse to specify the private key for your Google Cloud Storage service provider account.
Google provides the private key in JSON and PKCS12 format. The AVA cloud credentials page requires a
private key with a required extension of .pem or .json. You can read the client email and project ID from the
.json file.
Note: When connecting to Google Cloud storage with FIPS enabled, AltaVault requires all imported and generated keys sizes for
RSA-based and DSA-based certificates to be 2048 bits or higher. Connections to using 1024-bit certificates will not complete. It is
recommended to generate a new private key (2048-bit or higher) for Google Cloud Storage, save it in a.json file, and upload that
file when configuring AltaVault with Google Cloud Storage.
7. Specify the hostname.
8. Specify the bucket name associated with your cloud service provider account. If Nearline is selected as Storage
Class, the bucket should not be created through Google Developers Console. The Nearline bucket will
automatically be created by AltaVault. You can use buckets to organize your data and control access to your data,
but bucket cannot be nested.
For more information on bucket name restrictions, see Google documentation.
9. Specify the port number. Port 80 is not supported.
10. Enable Archiving - Enable this option if you are using the
AltaVault for cold storage mode. For more information
about cold storage mode, see “Deployment guidelines” on page 13.
11. Enable Cloud Deduplication - Enabling this option may improve deduplication rates for repetitive backup datasets,
lowering cloud storage costs. Disabling this option is recommended for Amazon Glacier to improve recovery of
recently written data from cache, but can decrease deduplication rates and increase cloud storage costs.
12. Enable Cloud CA Certificate - Specify a cloud CA certificate that will be used to validate the server certificate of
cloud provider. This must be a .pem or .json extension file.
13. Select the Enable Proxy check box to enable proxy server settings and specify:
Hostname/IP address - Specify the hostname or the IP address.
Ports - Specify the port numbers for access.
Username - Specify the name of the user for access.
Using the Wizard DashboardUsing the AltaVault configuration wizards
Beta Draft
Password - Specify the user’s password.
Configuring Microsoft Windows Azure storage
1. Select yes or no to use keys from KMIP server from the drop-down list. When configuring the KMIP server, you
must:
–Use the same username and password as created in KMS.
–Upload the same certificate as downloaded from KMS after signing it.
–Add a symmetric key (KMIP key) as the encryption key.
–Add a secret data key (KMIP key) for each of the authentication fields.
2. Specify the following settings:
Cloud Type - Select your option from the drop-down list. The options are Azure Government or Azure
Public. Use a storage account to access the Cool or Hot access tier.
Storage Account - Specify the Microsoft Azure Storage account name. The account type must be set to
Standard. AltaVault supports storage accounts belonging to either the Hot or Cool access tier.
Primary or Secondary Access Key - Specify the primary or secondary Microsoft Azure Storage access key
that you generated when you created your Microsoft Azure Storage account. The secondary key provides the
same access as the primary key and is used for backup purposes.
3. Specify the hostname.
4. Bucket Name - Specify the container name associated with your cloud service provider account. You can use
containers to organize your data and control access to your data, but they cannot be nested. If the container name
does not exist, the container is created during initial
AltaVault replication.
For Azure, the bucket names must be a valid DNS name, conforming to the following naming rules:
Container names must start with a letter or number and can contain only letters, numbers, and hyphens.
Every hyphen must be immediately preceded and followed by a letter or number. You cannot use consecutive
hyphens.
All letters in a bucket names must be lowercase.
Container names must be from 3 to 63 characters.
5. Specify the port number.
6. Enable Archiving - Enable this option if you are using the
AltaVault for cold storage mode. For more information
about cold storage mode, see “Deployment guidelines” on page 13.
7. Enable Cloud Deduplication - Enabling this option may improve deduplication rates for repetitive backup datasets,
lowering cloud storage costs. Disabling this option is recommended for Amazon Glacier to improve recovery of
recently written data from cache, but can decrease deduplication rates and increase cloud storage costs.
8. Enable Cloud CA Certificate - Optionally, specify a cloud CA certificate that will be used to validate the server
certificate of cloud provider. This must be .pem extension file.
9. Select the Enable Proxy check box to enable proxy server settings and specify:
Using the AltaVault configuration wizardsUsing the Wizard Dashboard
Beta Draft
Hostname/IP address - Specify the hostname or the IP address.
Ports - Specify the port numbers for access.
Username - Specify the name of the user for access.
Password - Specify the user’s password.
Configuring S3-based storage
1. Select yes or no to use keys from KMIP server from the drop-down list. When configuring the KMIP server, you
must:
–Use the same username and password as created in KMS.
–Upload the same certificate as downloaded from KMS after signing it.
–Add a symmetric key (KMIP key) as the encryption key.
–Add a secret data key (KMIP key) for each of the authentication fields.
2. Specify the following settings:
Access Key - Specify the access key (same as the username).
Secret Key - Specify the secret key (password).
3. Specify the hostname.
4. Specify the bucket name associated with your cloud service provider account. You can use buckets to organize
your data and control access to your data, but they cannot be nested. If the bucket name does not exist, the bucket
is created during initial
AltaVault replication.
5. Specify the port number.
6. Enable Archiving - Enable this option if you are using the
AltaVault for cold storage mode. For more information
about cold storage mode, see “Deployment guidelines” on page 13.
7. Enable Cloud Deduplication - Enabling this option may improve deduplication rates for repetitive backup datasets,
lowering cloud storage costs. Disabling this option is recommended for Amazon Glacier to improve recovery of
recently written data from cache, but can decrease deduplication rates and increase cloud storage costs.
8. Enable Cloud CA Certificate - Optionally, specify a cloud CA certificate that will be used to validate the server
certificate of cloud provider. This must be .pem extension file.
9. Select the Enable Proxy check box to enable proxy server settings and specify:
Hostname/IP address - Specify the hostname or the IP address.
Ports - Specify the port numbers for access.
Username - Specify the name of the user for access.
Password - Specify the user’s password.
Configuring SWIFT-based storage
1. Select yes or no to use keys from KMIP server from the drop-down list. When configuring the KMIP server, you
must:
Using the Wizard DashboardUsing the AltaVault configuration wizards
Beta Draft
–Use the same username and password as created in KMS.
–Upload the same certificate as downloaded from KMS after signing it.
–Add a symmetric key (KMIP key) as the encryption key.
–Add a secret data key (KMIP key) for each of the authentication fields.
2. If your cloud service provider is Oracle Storage Cloud Service - Object Storage, specify the following settings:
Storage Class - By default, Storage Class is set to Standard.
3. Specify the following settings:
Authentication - Specify the methods that is used to authenticate each request:
Access Key ID/Secret Key- Specify the access key ID, secret key, and tenant ID
Username/Password - Specify the username, password, and tenant ID
Username/API Access Key - Specify the username and the API Access key
Authentication URL Path - Specify the cloud server API URL for Cloudwatt Object Storage to authenticate
the request. For example, /auth/v1.0 or /auth/v2.0.
Web Protocol - Specify whether to use HTTP or HTTPS.
4. Specify the hostname.
5. Specify the bucket name associated with your cloud service provider account. You can use buckets to organize
your data and control access to your data, but they cannot be nested. If the bucket name does not exist, the bucket
is created during initial
AltaVault replication.
6. Specify the port number.
7. Enable Archiving - Enable this option if you are using the
AltaVault for cold storage mode. For more information
about cold storage mode, see “Deployment guidelines” on page 13.
8. Enable Cloud Deduplication - Enabling this option may improve deduplication rates for repetitive backup datasets,
lowering cloud storage costs. Disabling this option is recommended for Amazon Glacier to improve recovery of
recently written data from cache, but can decrease deduplication rates and increase cloud storage costs.
9. Enable Cloud CA Certificate - Optionally, specify a cloud CA certificate that will be used to validate the server
certificate of cloud provider. This must be .pem extension file.
10. Select the Enable Proxy check box to enable proxy server settings and specify:
Hostname/IP address - Specify the hostname or the IP address,
Ports - Specify the port numbers for access.
Username - Specify the name of the user for access.
Password - Specify the user’s password.
11. Click Apply to apply your changes to the running configuration.
Using the AltaVault configuration wizardsUsing the Wizard Dashboard
Beta Draft
Configuring Swift-based storage with region-selection
1. Select yes or no to Use Keys from KMIP Server from the drop-down list. When configuring the KMIP server, you
must:
–Use the same username and password as created in KMS.
–Upload the same certificate as downloaded from KMS after signing it.
–Add a symmetric key (KMIP key) as the encryption key.
–Add a secret data key (KMIP key) for the authentication fields.
2. Specify the following settings:
Region - Select the region from the drop-down list:
Username - Specify the username to authenticate each request.
API Access Key - Specify the API access key.
3. Specify the hostname.
4. Specify the bucket name associated with your cloud service provider account. You can use buckets to organize
your data and control access to your data, but they cannot be nested. If the bucket name does not exist, the bucket
is created during initial
AltaVault replication.
5. Specify the port number.
6. Enable Archiving - Enable this option if you are using the
AltaVault for cold storage mode. For more information
about cold storage mode, see “Deployment guidelines” on page 13.
7. Enable Cloud Deduplication - Enabling this option may improve deduplication rates for repetitive backup datasets,
lowering cloud storage costs. Disabling this option is recommended for Amazon Glacier to improve recovery of
recently written data from cache, but can decrease deduplication rates and increase cloud storage costs.
8. Enable Cloud CA Certificate - Optionally, specify a cloud CA certificate that will be used to validate the server
certificate of cloud provider. This must be .pem extension file.
9. Select the Enable Proxy check box to enable proxy server settings and specify:
Hostname/IP address - Specify the hostname or the IP address.
Ports - Specify the port numbers for access.
Username - Specify the name of the user for access.
Password - Specify the user’s password.
Customizing a private cloud
You need to contact NetApp technical support to configure a private cloud. After you configure a private cloud, the
cloud appears as the cloud provider in the cloud settings page.
To customize a private cloud
1. Contact NetApp Support to convert a cloud to a private cloud.
Using the Wizard DashboardUsing the AltaVault configuration wizards
Beta Draft
2. After you configure a private cloud using the CLI, it appears in the Cloud Settings page and the dashboard in the
Cloud Information section as the Provider. For more information on CLI, see the NetApp AltaVault Cloud Integrated Storage Command-Line Interface Reference Guide.
3. Choose Configure > Cloud Settings.
4. Select the Cloud tab.
5. Under Cloud Provider Settings, complete the configuration as necessary. Refer to your private cloud configuration
for the required authentication credentials needed to communicate with this cloud.
Using the import configuration wizard
Use the Import Configuration wizard to import a previously saved configuration into the AltaVault. The Import
Configuration Wizard will fail if the AltaVault already has an encryption key set.
It is recommended to set the time zone to the AltaVault prior to uploading the configuration.
To use the import configuration wizard
1. From the management console, choose Configure > Setup Wizard.
2. Select Import Configuration in the Wizard Dashboard.
3. Select one of the following options:
Select Local File and click Browse to select a local configuration file from your computer.
-or-
Select URL and specify the URL of an appliance whose configuration you want to import.
4. Leave the Import Shared Data Only check box selected to import only the following common settings:
Cloud settings
Email settings
Logging
NTP settings
SNMP settings
Statistics or Alarms settings
Time zone settings
Web and CLI preferences
SMB, NFS, OST, SnapMirror configuration
When you select the Import Shared Data Only check box, the following settings are not imported:
General Security Settings
Static host configuration
Appliance licenses
Interface configuration, IP configuration, static routes, and virtual interfaces.
Using the AltaVault configuration wizardsUsing the Wizard Dashboard
Beta Draft
Radius protocol settings
Name server settings and domains
Scheduled Jobs
SSH server settings and public or private keys
Hostname, Message of the Day (MOTD), and Fully Qualified Domain Name (FQDN)
TACACS protocol settings
Telnet server settings
5. Select the Key Passphrase protect the Encryption Key check box to specify a password for the encryption key. If
you select this option, you must enter the same password when you import or export the encryption key.
6. Click Import Configuration.
7. Click Exit.
Using the export configuration wizard
To use the export configuration wizard
1. From the management console, choose Configure > Setup Wizard.
2. Select Export Configuration.
3. Click Export Configuration to download the current AltaVault configuration file
AltaVault_config_(HOSTNAME)_(DATETIME).tgz.
If an encryption key passphrase is configured on AltaVault at the time you export the configuration, the
configuration file will require this passphrase when imported to another AltaVault appliance. For more
information about the encryption key passphrase, go to “Configuring encryption” on page 36.
You can specify cloud settings in the Configure > Cloud Settings page.
Before you configure cloud settings, you must configure DNS settings to access the cloud service provider host
machine on the Configure > Host Settings page.
This section includes the following topics:
“Configuring cloud provider settings” on page 35
“Configuring encryption” on page 36
“Configuring replication” on page 36
“Configuring bandwidth limits” on page 36
To transition cloud credentials and the encryption key from the AltaVault to a Key Management Server (KMS), refer
to the section “Configuring KMIP” on page 93.
Configuring cloud provider settings
This setting enables you to access the storage and software through the Internet. For more details on cloud provider
settings, see “Using the Cloud Settings wizard” on page 22.
Only users who have Read-Only Replication Settings permission or Read and Write Replication Settings permission
can access and configure the Cloud Settings Page.
The new datastore encryption key can be generated or imported from an existing one.
To secure the encryption key, protect it using a key passphrase. This passphrase will be used to encrypt the datastore
encryption key and must be provided whenever importing this datastore encryption key, such as for disaster recovery.
It is not stored within a configuration archive and must be kept in a secure location.
For more information on encryption, see “Using the Cloud Settings wizard” on page 22.
Configuring replication
Replication is the process of copying data and metadata from the AltaVault to the cloud. The AltaVault replicates data
to the cloud asynchronously.
Only users who have Read-Only Replication Settings permission or Read and Write Replication Settings permission
can access and configure the Replication Settings Page.
To configure replication
1. Choose Configure > Cloud Settings.
2. Select the Replication tab.
3. Under Replication Settings, complete the configuration as described in this table.
ControlDescription
Pause Replication atSpecify the time (in HH:MM:SS format) at which you want replication to pause.
Resume Replication atSpecify the time (in HH:MM:SS format) at which you want replication to resume.
Bytes pending replication alert limitDisplays an alarm if the number of bytes pending replication to the cloud exceeds the
value you specify. The default value is 500 GiB.
Bytes pending replication clear limitSpecify the lower limit at which the bytes pending replication alert limit notification is
Suspend ReplicationClick to temporarily stop replication.
4. Click Apply to complete your changes.
cleared. The default value is 450 GiB
Configuring bandwidth limits
You can limit the bandwidth that the AltaVault uses to replicate data and restore data in the bandwidth limit settings
page.
Only users who have Read-Only Replication Settings permission or Read and Write Replication Settings permission
can access and configure the Bandwidth Limit Settings Page.
Cloud Replication InterfaceSelect a data interface to use for sending data to and restoring data from the cloud.
Replication Limit RateSpecify a rate to limit the data transmitted to the cloud storage provider in kilobits per
Restore Limit RateSpecify a rate to limit the data restored
Enable Bandwidth Limit SchedulingBefore you select this option, you must specify the replication/restore options above.
Select the interface in the drop-down list and then specify the bandwidth limits and
scheduling. You must first configure the data interfaces before they appear in the dropdown list.
Setting the replication interface to Primary/Default is not recommended as this is the
management interface for the appliance.
seconds (kbps).
in kilobits per second (kbps).
Select the check box and specify:
• Start Time - the time at which the bandwidth limit should start.
• End Time - the time at which the bandwidth limit should end.
• Replication Limit Rate - the replication rate during the defined schedule. The
bandwidth reverts to the normal replication limit rate outside the scheduled times.
• Restore Limit Rate - the restore rate during the defined schedule.
• Include Weekends - apply schedule to weekdays and weekends.
3. Click Apply to apply your changes to the running configuration.
After you apply your settings, you can verify whether changes have had the desired effect by reviewing related
reports.
Configuring SMB
SMB is currently enabled in two versions: SMBv2 and SMBv3. SMBv2 is the default protocol that is used with
Windows 2000 and Windows 2008 systems, and SMBv3 is the default protocol that is used with Windows 2012
systems. AltaVault supports SMB2 and SMB3. You can configure SMB access for Microsoft Windows based clients
to the AltaVault in the Configure > SMB page.
Note: If you are upgrading to AVA4.2 or later releases, migration of your CIFS configuration from earlier AVA releases to AVA
SMB is supported. For detailed SMB deployment information, see the NetApp AltaVault (Formerly SteelStore) Cloud-Integrated
Storage Appliances SMB Deployment Guide (Technical Report 4511).
When configuring SMB, you perform the following tasks:
“To configure an Active Directory domain” on page 38
“To add an SMB share” on page 39
“To add a local user to access the share” on page 40
“To edit local user permission to access the share” on page 40
If your network has an Active Directory (AD) domain, you can add the AltaVault to the domain and enable domain
users to access AltaVault SMB shares. You can add the AltaVault only to one domain. Ensure that you have
permissions to join appliances to the domain.
1. The SMB page does not appear until the Storage Optimization Service is started. If needed, choose Maintenance
> Service and click Start to initialize the service.
2. Optionally, you can specify up to three preferred domain controllers. Under Preferred Domain Controllers, enter
a fully qualified domain name or IPv4 address for each controller. AltaVault accesses preferred controllers in order,
starting with Domain Controller 1.
If no controllers are specified, AltaVault uses DNS to discover domain controllers.
3. Click Apply.
4. To join the AltaVault to an AD domain, go to the Domain section and specify:.
ControlDescription
Domain NameSpecify the fully qualified domain name of the AD that the AltaVault will join.
UsernameSpecify the username of a user which has appropriate permissions to add computers to
the domain.
PasswordSpecify the user’s domain password.
5. Click Show Advanced Settings to display Advanced Settings to (optionally) configure the domain. Complete the
configuration as described in this table.
ControlDescription
HostnameOptionally, specify the hostname that the AltaVault will use as part of the domain.
Join DomainAttempt to join the AltaVault to your AD domain.
AltaVault then appears as the specified hostname in the AD.
6. After you join a domain, the Domain section of the SMB page changes to reflect the domain that the AltaVault has
joined.
When you leave a domain, specify:.
ControlDescription
UsernameOptionally, specify the username of a user which has appropriate permissions to add
computers to the domain.
PasswordOptionally, specify the user’s domain password.
Leave DomainAttempt to remove AltaVault from the domain.
Reboot all client machines that were used to connect to the AltaVault to delete cached domain credentials.
1. The SMB page does not appear until the Storage Optimization Service is started. If needed, choose Maintenance
> Service and click Start to initialize the service.
2. Optionally, under Pinned Data Information, slide the indicator along the bar to select the bytes allowed for share
pinning. Share pinning instructs the share to always retain data on AltaVault locally without fetching it from the
cloud.
3. To add an SMB share, complete the configuration as described in this table.
ControlDescription
Add SMB ShareDisplays the controls to add a new SMB share.
Share NameSpecify the name of the share.
Pin ShareOptionally, enable data pinning on the share. Select Yes or No from the drop-down list
to specify whether the SMB share should be pinned. Share pinning enables the share to
always contain data that is available to the AltaVault locally without fetching it from the
cloud. You can pin SMB shares only at the time of share creation. Existing unpinned
shares cannot be pinned.
Once a share is pinned, unpinning of that share can be performed via CLI and requires
optimization service to be offline. Unpinning a share can be a time-consuming
operation. Unpinning a share does not result in erasing the previously pinned data. After
unpinning, the previously pinned data becomes available for eviction.
You cannot remove a pinned share if it contains data.
Early EvictionSpecify whether or not data from this share should be assigned a higher priority for
eviction.
If you select yes, data written to this share is eligible for eviction earlier than other data.
Disable DedupeSpecify whether or not data written to this share should be checked for duplication. If
Disable CompressionSpecify whether or not data written to this share should be compressed.
Local PathSpecify the internal pathname on the AltaVault to which this SMB share writes data.
CommentEnter a comment about the share. You can use alphanumeric characters, underscores,
Read OnlyConfigure the share to be a read-only.
Allow Everyone AccessEnable global access to the SMB share.
you select yes, then the AltaVault will not perform duplication checks on data written to
the share.
Select yes if your data set is already in a compressed format and will not benefit from
further compression attempts.
Note: AltaVault does not support having two shares with the same local path. Do not
create two shares with the same local path. Additionally, nesting shares (local path of a
share is part of the local path of another share) is not recommended.
hyphens, and spaces.
Clear this check box if you want to enable individual authentication.
Add ShareAdds the SMB share to the AltaVault.
Remove SelectedDeletes the selected SMB share.
The share you configured appears in the list of shares on the page along with the option to add a local user.
SMB share security and access can be administered in AD domains via Windows Explorer. If AltaVault is not within
an Active Directory domain, use a local user account to gain access to a share.
1. To add a local user to access the share that you created, expand the share name to complete the configuration as
described in the following table.
Note: A local SMB user must first be created as described in the “To add local SMB user” on page 41 before you can add the user
to a share.
ControlDescription
Add a UserDisplays the controls to add a user to the share.
UserSelect the user from the drop-down list.
AccessSelect one of the following options from the drop-down list:
Allow - Allows the user read, write, and modify privileges to the share.
Deny - Denies the user read, write, and modify privileges to the share.
Remove SelectedDeletes the selected user from the SMB server.
Add UserAdds the SMB user.
2. Click Apply Changes.
To edit local user permission to access the share
After adding local user access to the share, you can edit access permissions for each user.
1. Expand the user name to change permissions as described in the following table.
ControlDescription
Edit PermissionsSelect the following options:
Allow - Allows the user Read, Write, or Modify permission for the share.
Deny - Denies the user Read, Write, or Modify permission for the share.
Note: Permission settings are hierarchical; that is, Read permission provides read-only
access to the share. Write permission provides read and write access to the share. Modify
permission provides full control of the share.
1. To add SMB user to access the share that you created, complete the configuration as described in this table.
ControlDescription
Add SMB UserDisplays the controls to add a user to the SMB share.
User NameSpecify the user name of a local user to access the SMB share. The user name is case
PasswordSpecify the password for the new user.
Password ConfirmRe-enter the new password for the new user.
AdminSelect one of the following options from the drop-down list:
AccountSelect one of the following options from the drop-down list:
Remove SelectedRemoves local SMB user configuration.
Add Adds local SMB user.
sensitive.
• Yes - Provides Administrator privileges to user
• No - Disables Administrator privileges to user
• Enabled - Enables local user account for accessing SMB share
• Disabled - Disables local user account from accessing SMB share
To edit SMB local user
1. Extend the user name to complete the configuration as described in this table.
ControlDescription
Change PasswordSelect the check box to change the password.
PasswordSpecify the new password for the user.
Password ConfirmRe-enter the new password for the user.
AdminSelect one of the following options from the drop-down list:
• Yes - Provides Administrator privileges to user
• No - Disables Administrator privileges to user
AccountSelect one of the following options from the drop-down list:
• Enabled - Enables local user account for accessing SMB share
• Disabled - Disables local user account from accessing SMB share
Remove SelectedDeletes the selected user from the SMB server.
ApplyApplies the changes to the SMB share users.
To edit multichannel settings
SMB multichannel is a feature that allows SMBv3 shares to be accessed via multiple network interfaces from Windows
hosts that support SMBv3.
1. Multichannel support is disabled for all interfaces by default. To enable an interface (e0a, e0b, e0c), select the
checkbox for the interface and click Enable.
You can configure Network File System (NFS) for Unix and Linux based clients in the Configure > NFS page. Before
you configure NFS, choose Maintenance > Service and click Stop to stop the Storage Optimization Service.
This section includes the following topics:
“Configuration tasks” on page 42
“Editing an NFS configuration” on page 44
“Troubleshooting NFS” on page 45
Configuration tasks
You can configure NFS on the Configure > NFS page.
To configure NFS protocol
1. The NFS page does not appear until the Storage Optimization Service is started. If needed, choose Maintenance >
Service and click Start to initialize the service.
2. Optionally, under Pinned Data Information, slide the indicator along the bar to select the maximum bytes allowed
for share pinning. Share pinning instructs the share to always contain data that is available to the AltaVault locally
without fetching it from the cloud.
3. Optionally, upload the Kerberos keytab file (/etc/krb5.keytab), then upload a valid Kerberos configuration file
(.krb5.conf).
The keytab file is an encrypted, local, on-disk copy of the host's key. The configuration file contains Kerberos
configuration information, including the locations of KDCs (Key Distribution Center) and administration servers
for the Kerberos realms, default parameters for the current realm and for Kerberos applications, and mappings of
host names onto Kerberos realms.
4. Under Add an Export, complete the configuration as described in this table:
ControlDescription
Add an ExportDisplays the controls to export an NFS share.
NameSpecify the name of the export share.
Export as NFSv4Specify the type of NFS export. If you select yes, the export will be configured as
NFSv4 export. If you select no, the export will be configured as NFSv3 export.
Kerberos AuthenticationKerberos authentication works only with NFSv4 exports. It is optional. If you are not
using Kerberos, AltaVault does not use any other means of authentication for NFSv4
exports.
Pin ExportOptionally, enable data pinning on the share. Select Yes or No from the drop-down list
to specify whether the NFS export should be pinned. Share pinning enables the share to
always contain data that is available to the AltaVault locally without fetching it from the
cloud. You can pin NFS exports only at the time of share creation. Existing unpinned
shares cannot be pinned.
Once a share is pinned, unpinning of that share can be performed via CLI and requires
optimization service to be offline. Unpinning a share can be a time-consuming
operation. Unpinning a share does not result in erasing the previously pinned data. After
unpinning, the previously pinned data becomes available for eviction.
You cannot change this option after the NFS export is created.
Early EvictionSpecify whether or not data from this share should be assigned a higher priority for
eviction.
If you select yes, data written to this share is eligible for eviction earlier than other data.
Disable DedupeSpecify whether or not data written to this share should be checked for de-duplication.
Disable CompressionSpecify whether or not data written to this share should be compressed.
Local PathSpecify the internal pathname on the AltaVault to which this share writes data.
CommentEnter a comment about the NFS share. You use only alphanumeric characters,
Export AsynchronouslySelect the check box to export the NFS share asynchronously. Click the icon for the
Allow Specified ClientsSpecify which clients can connect to the NFS share.
If you select yes, then the AltaVault will not perform duplication checks on data written
to the share.
Select yes if your data set is already in a compressed format and will not benefit from
further compression attempts.
underscores, hyphens, and spaces in this field.
following information:
Exporting NFS asynchronously forces the server to drop all fsync requests from the
client. It is required to obtain good performance with NFS clients that issue frequent
NFS COMMIT operations, which might degrade the AltaVault performance
significantly. Many UNIX clients often execute NFS COMMIT operations when low on
memory. To understand the circumstances that cause this behavior and to detect and
prevent it, contact your client operating system vendor. The AltaVault automatically
synchronizes any file that is idle for a configurable amount of time. The default value is
10 seconds. Although there is a window of time (after the server responds with success
for an fsync request, and before the data is written to disk), this window is small and
performance benefits are large. NetApp recommends exporting NFS asynchronously.
To limit access, specify the client’s IP address and subnet mask.
By default, all clients can access the share, until the first client is client is entered. To
revert to full access after adding a client, specify 0.0.0.0/0 in the Client IP/Network field
IP/Network field.
Allow All ClientsEnables all clients connected to the AltaVault system to access the NFS share.
WARNING: Enabling all clients to access the NFS share is not recommended.
Add Adds the export path and client IP address to the AltaVault NFS server.
Remove SelectedSelect the check box next to the name and click Remove Selected.
The share you configure and its parameters appear in the list of shares on the page.
5. Click Add to apply your changes to the running configuration.
1. Choose Configure > NFS and click the share name at the bottom of the page.
2. Select the NFS share name and specify:
ControlDescription
Edit ExportSelect tab to edit the exported NFS share.
Local PathChange the export file pathname, which starts with a forward slash (/).
CommentSpecify or change the comment about the NFS share.
Export as NFSv4Not available for editing.
Kerberos AuthenticationAvailable for editing only when Export as NFSv4 is selected.
PinnedNot available for editing.
Early EvictionSelect yes or no from the drop-down list to specify whether or not data from this share
Disable DedupeSpecify whether or not data written to this share should be checked for de-duplication.
Disable CompressionSpecify whether or not data written to this share should be compressed.
Export AsynchronouslySelect the check box to export the NFS share asynchronously. Click the icon for the
Allow All ClientsEnables all clients connected to the AltaVault system to access the NFS share.
should be assigned a higher priority for eviction.
If you select yes, data written to this share is eligible for eviction earlier than other data.
If you select no, data written to this share is evicted using the default method.
If you select yes, then the AltaVault will not perform duplication checks on data written
to the share.
Select yes if your data set is already in a compressed format and will not benefit from
further compression attempts.
following information:
Exporting NFS asynchronously forces the server to drop all fsync requests from the
client. This is a feature of the NFS protocol. It is required to obtain good performance
with NFS clients that issue frequent NFS COMMIT operations, which might degrade
the AltaVault performance significantly. Many UNIX clients often execute NFS
COMMIT operations when low on memory. To understand the circumstances that cause
this behavior and to detect and prevent it, contact your client operating system vendor.
The AltaVault automatically synchronizes any file that is idle for a configurable amount
of time. The default value is 10 seconds. Although there is a window of time (after the
server responds with success for an fsync request and before the data is written to disk),
this window is small and performance benefits are large. NetApp recommends
exporting NFS asynchronously.
Allow Specified ClientsEnables only the clients that you specify to connect to the AltaVault system to access
the NFS share. If you select this option, you must specify the client’s IP address and
subnet mask in the Client IP/Network text field below it. To enable all clients to access
the NFS share, specify 0.0.0.0/0 in the Client IP/Network field.
Mount CommandsSelect this tab to display the Linux and UNIX NFS mount commands. You configure
the mount commands through the command-line. These commands are for your
reference.
If the AltaVault is a secondary appliance, the mount commands enable only read
permissions and not write permissions.
3. Click Apply to apply your changes to the running configuration.
Troubleshooting NFS
Use the following table to help resolve NFS issues.
SymptomDescription
User attempts to map an NFS share fail; users are unable
to connect to a share after a client or AltaVault reboot
Certain services, such as NFSv3, rely on RPC to assign a port
number to services from a dynamic range. For AltaVault, this range
is 32768 - 61000. Reboots of clients or AltaVault can cause a port
re-negotiation, which is expected and normal for TCP/IP and UDP
protocols. Your firewall must be configured to allow for a range of
ports or the connection can be denied. Check your firewall
configuration and update access policies as necessary.
Configuring OST
OpenStorage (OST) is a proprietary protocol created by Veritas for ingesting backup data streams to (third-party) disklike storage devices. OST is implemented as a plug-in (shared object/DLL) running in NetBackup media server process
address space and streaming data to the OST server running on the AltaVault.
You can perform the following tasks:
“To configure OST share” on page 45
“To add an OST user to access the share” on page 46
“To edit OST user” on page 47
For information on configuring up the AltaVault OST Plug-in for communication with AltaVault, see the NetApp
AltaVault OST Plug-in Deployment Guide.
To configure OST share
1. The OST page does not appear until the Storage Optimization Service is started. If needed, choose Maintenance >
Service and click Start to initialize the service
2. Optionally, under Pinned Data Information, slide the indicator along the bar to select the maximum bytes allowed
for share pinning. Share pinning instructs the share to always retain data locally on the AltaVault without fetching
it from the cloud.
3. Click Apply to apply your changes.
4. To add an OST share, click Add OST Share and specify:.
ControlDescription
Share NameSpecify the name of the share.
TypeSelect regular or cloud.
Regular shares treat incoming data by AltaVault the same as traditional SMB shares or
NFS exports by writing the data on cache, and replicating the data to the cloud.
Cloud shares are used to create an optimized duplicate of data in regular shares
replicated in the cloud that are managed via NetBackup storage lifecycle policies (SLP).
Pin ShareOptionally, enable data pinning on the share. Select Yes or No from the drop-down list
to specify whether the OST share should be pinned. Share pinning enables the share to
always contain data that is available to the AltaVault locally without fetching it from the
cloud. You can pin OST shares only at the time of share creation. Existing unpinned
shares cannot be pinned.
Once a share is pinned, unpinning of that share can be performed via CLI and requires
optimization service to be offline. Unpinning a share can be a time-consuming
operation. Unpinning a share does not result in erasing the previously pinned data. After
unpinning, the previously pinned data becomes available for eviction.
You cannot remove a pinned share if it contains data.
Early EvictionSpecify whether or not data from this share should be assigned a higher priority for
eviction.
If you select yes, data written to this share is eligible for eviction earlier than other data.
Disable DedupeSpecify whether or not data written to this share should be checked for duplication. If
Disable CompressionSpecify whether or not data written to this share should be compressed.
Add ShareAdds the OST share to the AltaVault.
you select yes, then the AltaVault will not perform duplication on data written to the
share.
Select yes if your data set is already in a compressed format and will not benefit from
further compression attempts.
5. Optionally, to remove an OST share, select the OST share from the table and click Remove Selected
6. Optionally, to enable SSL communication between the AltaVault OST Plug-in and the AltaVault, select the
checkbox, Enable SSL, in the Global OST Settings section, and click Apply. AltaVault will communicate with
the AltaVault OST Plug-in using secured port 8085.
To add an OST user to access the share
1. To add a user to access the share that you created, select the share and specify:
Note: OST shares must have an associated user to be used by NetBackup storage server. Multiple users per OST share are allowed.
ControlDescription
Add OST UserDisplays the controls to add a user to the OST share.
User NameType the user name that you would use for authenticating the share from NetBackup.
1. Extend the user name to complete the configuration as described in this table.
ControlDescription
Change PasswordSelect the check box to change the password.
PasswordSpecify the new password.
Password ConfirmRe-enter the new password.
AccountSpecify:
• Enabled - Enables local user account
• Disabled - Disables local user account
ApplyApplies the changes to the OST share users.
Configuring SnapMirror
AltaVault supports backup and restore operations for ONTAP FlexVol volumes using the SnapMirror service. Backup
relationships are created and managed from ONTAP using ONTAP commands or SnapCenter software. SnapMirror
support is available on AltaVault physical and virtual appliance models. For more information about SnapMirror
operation with ONTAP, see the
Data Fabric Solution for Cloud Backup resource page.
This section includes the following topics
“Enabling SnapMirror service” on page 47
“Monitoring and deleting SnapMirror shares and Snapshots on AltaVault” on page 48
“Enabling long-term retention” on page 49
“Enabling SnapCenter access” on page 50
Enabling SnapMirror service
To enable SnapMirror service
1. Choose Configure > SnapMirror in the Management Console.
2. Under SnapMirror Service, click Enable.
3. If the “Service restart required” prompt appears, click the Restart button that becomes enabled in the upper right
portion of the AltaVault Management Console.
4. Under Whitelist IP, click Add Whitelist IP.
The Whitelist specifies which addresses are authorized to communicate with AltaVault.
5. Enter the IP addresses of ONTAP intercluster LIFs from which AltaVault will accept connections for backup and
restore operations, and click Add.
The list of authorized IP addresses must be populated prior to initiating a connection from the ONTAP system or
the connection will be rejected.
To remove an IP address, select the IP Address and click Remove Selected. Removing an IP address from the
whitelist disables access to the AltaVault from that IP address.
Note: If you are using SnapCenter to manage backups, SnapCenter automatically creates the whitelist of approved IP addresses
when you initiate a backup from SnapCenter. In this case, there is no need to create the IP whitelist.
To disable SnapMirror service
1. Choose Configure > SnapMirror in the Management Console.
2. Under SnapMirror Service, click Disable.
When SnapMirror service is disabled, the shares and Snapshots that exist on AltaVault are not deleted and are
kept intact. Snapshots are not accessible while service is disabled. Snapshots can be restored only when
SnapMirror service is enabled.
3. If the Service restart required prompt appears, click the Restart button that becomes enabled in the upper right of
the console.
Monitoring and deleting SnapMirror shares and Snapshots on AltaVault
A SnapMirror share is created automatically when the SnapMirror relationship with the AltaVault is created in ONTAP
or in SnapCenter. Based on SnapMirror policies, Snapshot copies of ONTAP volumes are backed up to the associated
AltaVault share. AltaVault provides global deduplication on all Snapshot backup streams prior to replication to the
cloud.
Snapshots backed up to AltaVault shares are read-only copies and can only be restored back to ONTAP using ONTAP
commands or SnapCenter.
To view SnapMirror shares and Snapshots on AltaVault
1. Under SnapMirror Shares, review the information fields associated with a share:
FieldDescription
NameSpecifies the name of the share created in ONTAP using the ONTAP CLI or by using
SnapCenter software. When the ONTAP administrator creates a SnapMirror
relationship with AltaVault, a share is automatically created in AltaVault. Each share is
associated with one ONTAP FlexVol volume. AltaVault supports up to 500 SnapMirror
shares.
To view a list of Snapshots associated with each share, select a share name.
Peer PathIdentifies the source volume in ONTAP that is being backed up to AltaVault.
UUIDLists the unique identifier associated with each SnapMirror share. The UUID value is
generated by AltaVault.
SizeSpecifies the size of the SnapMirror share. The size can grow or shrink as Snapshots are
Shares on the AltaVault have no size limitation but are bound by the AltaVault’s cache
capacity. The size of source volume, change rate, and number of Snapshots will impact
the number and size of SnapMirror shares on the AltaVault.
2. To view the list of Snapshots for a share, select a share and review the Snapshot information:
FieldDescription
NameList Snapshot for a share. Snapshot backups can be triggered in ONTAP through
UUIDLists the unique identifier associated with each Snapshot copy. The UUID value is
CreatedDisplays the date and time when the Snapshot was created in ONTAP.
SizeSpecifies the size of a Snapshot.
StatusIdentifies the status of Snapshot replication to the cloud. Replication status can be either
SnapMirror policies, by explicitly running the ONTAP update command, or through
SnapCenter software.
generated by ONTAP.
During the lifetime of a share, there is only one baseline Snapshot. Any Snapshot after
the baseline is always incremental. Baseline transfer can take a long time to complete
depending on the size of the Snapshot.
During incremental Snapshot backups, only the changed blocks between two Snapshots
are transferred.
Completed or Pending.
To delete SnapMirror shares and Snapshots on AltaVault
1. To remove a share or Snapshot, select the share or Snapshot and click Remove Selected.
Snapshots can be deleted on the AltaVault through ONTAP SnapMirror policies or SnapCenter policies, or by
manual deletion on AltaVault. When a share is deleted, Snapshots belonging to that share are also deleted.
AltaVault reclamation will recover the space occupied by the deleted Snapshot or Share asynchronously, and
Share size may not immediately reflect available space from the operation.
Note: You cannot delete the latest Snapshot. Also, a Snapshot cannot be deleted while a restore is in progress.
Enabling long-term retention
AltaVault supports up to 500 SnapMirror shares in one of two modes: short-term retention (default) or long-term
retention. For short-term retention, each share supports up to 251 Snapshots, and Snapshot retention is dependent upon
the retention policy set up in ONTAP. For example, suppose a share has a two-tier retention policy supporting 50 hourly
and 100 daily Snapshots. In this case, when the count of hourly Snapshots exceeds 50 or the daily count exceeds 100,
the oldest snapshot of the respective tier is deleted.
For long-term retention, each share supports up to a maximum of 3700 Snapshots, which is equivalent to 10 years
worth of daily Snapshots. Long-term retention allows AltaVault to continue storing Snapshots until it reaches the
maximum. If a share exceeds 3700 Snapshots, AltaVault begins deleting the oldest Snapshot copies to make room for
new ones.
When long-term retention is turned off (disabled), AltaVault reverts to using the retention policy set up in ONTAP,
which supports a maximum 251 Snapshots per share. If there are large numbers of Snapshots (more than 251) when
long-term retention is turned off, the number of snapshots will be reduced to match the count set in the retention policy.
The retention method used for Snapshot retention applies to all SnapMirror shares created on the AltaVault.
Important: If SnapCenter is being used to manage backups, long-term retention will be enabled or disabled from SnapCenter. Do
not disable or enable long-term retention on the AltaVault appliance explicitly while SnapCenter is managing backups.
Enabling SnapCenter access
SnapCenter can be used to back up and delete Snapshots, and to perform single file restores. If you are using
SnapCenter to manage backups, you must enable SnapCenter access on AltaVault.
Additionally, before you can use SnapCenter to manage backups on AltaVault, you must configure a role-based
account on AltaVault for SnapCenter administrator access. This account must have the read/write permissions for the
following user roles: General, Replication, Storage.
To create a role-based user account for SnapCenter on AltaVault
1. Choose Configure > User permissions in the Management Console.
2. Under role-based accounts, select Add a New User.
3. Enter an account name and password, and check Enable Account.
4. Select Read/Write permission for the following roles: General Settings, Replication Settings, Storage Settings.
You can view and modify general host settings in the Configure > Host Settings page.Use the following groups of
controls on this page only if modifications or additional configuration is required:
Name - Modify the hostname.
DNS Settings - NetApp recommends that you use DNS resolution.
Hosts - If you do not use DNS resolution, or if the host does not have a DNS entry, you can assign a host-IP
address resolution map.
Web/FTP Proxy - Configure proxy addresses for Web or FTP proxy access to the AltaVault. The proxy settings do
not affect cloud connections originating from the AltaVault.
To view general host settings
Choose Configure > Host Settings.
To change the hostname
1. Choose Configure > Host Settings.
2. Under Name, modify the value in the Hostname field.
3. Click Apply to apply your changes to the running configuration.
PortOptionally, specify the port for the Web or FTP proxy. The default port is 1080.
Enable AuthenticationOptionally, select to require user credentials for use with Web or FTP proxy traffic.
Specify the following settings to authenticate the users:
• User Name - Specify a username.
• Password - Specify a password.
• Authentication Type - Select an authentication method from the drop-down list:
– Basic - Authenticates user credentials by requesting a valid username and
password. This is the default setting.
– NTLM - Authenticates user credentials based on an authentication challenge and
response.
– Digest - Provides the same functionality as Basic authentication; however, Digest
authentication improves security because the system sends the user credentials
across the network as a Message Digest 5 (MD5) hash.
3. Click Apply to apply your changes to the running configuration.
The proxy settings do not affect cloud connections originating from the AltaVault.
Modifying management interfaces
You can view and modify settings for the appliance interfaces in the Management Interfaces page. Use the following
groups of controls on this page only if you require modifications or additional configuration:
Primary Interface - The primary interface is the interface used to manage the device. It is the interface utilized to
get to the Management Console and command-line interface (CLI). This is also the default port used for
replication if no other interface is set up for replication traffic as described in “Configuring bandwidth limits” on
page 36.
Main IPv4 Routing Table - Displays a summary of the main routing table for the appliance. You can add static
routes that might be required for some subnets.
To display and modify the configuration for management interfaces
1. Choose Configure > Management Interfaces.
2. Under Primary Interface, complete the configuration as described in this table.
ControlDescription
Enable Primary InterfaceEnables a primary interface for the AltaVault.
If only one interface is set up, both appliance management and replication traffic will
traverse it.
Obtain IPv4 Address AutomaticallyAutomatically obtain an IPv4 address from a DHCP server.
• Enable IPv4 Dynamic DNS - Select this option to enable IPv4 dynamic DNS on the
primary interface.
Modifying data interfacesModifying networking settings
Beta Draft
2. Under Physical Interface, click the arrow next to the name of the interface and complete the configuration as
described in this table.
.
ControlDescription
Enable Data InterfaceSelect the check box to enable the data interface and specify the following settings:
• IPv4 Address
• IPv4 Subnet Mask
• IPv4 Gateway
- Specify an IPv4 address.
- Specify a subnet mask.
- Specify the gateway IP address.
• MTU - Specify the MTU value. The default value is 1500.
If a physical interface is a member of a virtual interface, it is owned by the virtual interface and you can only
enable it by editing the virtual interface.
3. Under Routing Table for <physical interface>, you can configure static routes if your network requires them.
You can add or remove routes from the table as described in following table.
.
ControlDescription
Add a New RouteDisplays the controls for adding a new route.
Destination IP AddressSpecify the destination IP address for the appliance.
Subnet MaskSpecify the subnet mask.
Gateway IP AddressSpecify the IP address for the gateway.
AddAdds the route to the table list.
Remove SelectedSelect the check box next to the name and click Remove Selected.
4. Under Virtual Interface, click the arrow next to the name of the interface to enable and configure the VIF
networking configuration. Create virtual interfaces from the Configure > VIFs page.
.
ControlDescription
Virtual InterfaceDisplays the controls to add a virtual network interface.
IP ConfigurationDisplays the IP address of the network interface.
EnabledDisplays the state of the interface.
MembersSpecify a comma-separated list of the data interfaces that are members of this VIF.
Enable Data InterfaceSelect this check box to enable the data interface and specify the following settings:
• IPv4 Address
• IPv4 Subnet Mask
• IPv4 Gateway
• MTU - Specify the MTU value. The default value is 1500.
5. Under VLAN Interface, click the arrow next to the name of the interface to complete the configuration. Create
virtual interfaces from the Configure > VLANs page.
.
ControlDescription
IP ConfigurationDisplays the IP address of the network interface.
EnabledDisplays the state of the interface.
Enable InterfaceSelect the check box to enable the data interface and specify the following settings:
• IPv4 Address
• IPv4 Subnet Mask
• IPv4 Gateway
• MTU - Specify the MTU value. The default value is 1500.
- Specify an IPv4 address.
- Specify a subnet mask.
- Specify the gateway IP address.
If an interface is a member of a virtual interface, you can only enable it by editing the virtual interface.
6. Under Routing Table for <VLAN interface>, you can configure static routes if your network requires them.
You can add or remove routes from the table as described in following table.
.
ControlDescription
Add a New RouteDisplays the controls for adding a new route.
Destination IP AddressSpecify the destination IP address for the appliance.
Subnet MaskSpecify the subnet mask.
Gateway IP AddressSpecify the IP address for the gateway. The gateway must be in the same network as the
network interface you are configuring.
AddAdds the route to the table list.
Remove SelectedSelect the check box next to the name and click Remove Selected.
7. Click Apply to save your changes.
Modifying virtual interfaces (VIFs)
You can view, add and modify virtual interfaces (VIFs) in the Configure > VIFs page. A VIF is a logical bonded
interface created by aggregating multiple physical interfaces.
To display, add, and modify the VIF configuration
1. Choose Configure > VIFs.
2. Click Add a Virtual Interface and complete the configuration as described in this table.
ControlDescription
Enable VIFEnables VIF feature.
Virtual Interface NameSpecify a name for the virtual interface.
Member InterfacesSpecify a comma-separated list of the data interfaces that are members of this VIF.
• 802.3ad - Enables IEEE 802.3ad Dynamic Link Aggregation. This mode enables
you to bundle or aggregate multiple physical interfaces into a single VIF and enables
load balancing between the interfaces.
• Transmit/Receive Load Balance - Provides both transmit and receive load
balancing.
• Transmit Load Balance - Provides adaptive-transmit load balancing. The
AltaVault distributes the outgoing traffic based on the current load on each member
interface. One of the member interfaces of the VIF receives the incoming traffic.
Monitoring intervalSpecifies the Media Independent Interface (MII) link monitoring frequency in
milliseconds. This determines how often the link state of each slave is inspected for link
failures. A value of zero disables MII link monitoring. A value of 50 is a good starting
point.
AddAdds the VIF to your configuration.
Remove SelectedSelect the check box next to the existing VIF to remove, and click Remove Selected.
3. Choose Maintenance > Service and click Restart for the configuration changes to take effect.
Modifying VLANs
VLAN tagging enables AltaVault to direct network packets to specific virtual local area networks (VLANs) in order
to segment data traffic.
To display, add, or modify a VLAN configuration
1. Stop the Storage Optimization Service before adding or removing a VLAN. If needed, choose Maintenance >
Service and click Stop to terminate the service.
2. Choose Configure > VLANs.
3. Click Add a VLAN Interface and complete the configuration as described in this table.
ControlDescription
VLAN IDSpecify the VLAN tag identifier. This can be an integer from 2 to 4094.
Interface TypeSelect from Data Interface or Virtual Interface (VIF).
Data InterfacesSelect from the drop-down list.
VIFsSelect from the drop-down list.
AddAdds the VLAN interface to your configuration.
Remove SelectedSelect the check box next to the name and click Remove Selected.
Note: A restart of AltaVault is required before performing any further networking
changes.
4. Choose Maintenance > Service and click Start for the changes to take effect.
You can create or modify a login message to be displayed in the Management Console Login page. You can also post
a message of the day to appears in the Home page and when you first log in to the CLI.
To set an announcement
1. Choose Configure > Announcements.
2. Use the controls to complete the configuration as described in this table.
ControlDescription
Login Message Type a message in the text box to appear on the Login page.
MOTD Type a message in the text box to appear on the Home page as the message of the day.
Configuring system administrator settingsConfiguring alarm settings
Beta Draft
AltaVault uses hierarchical alarms. The system groups certain alarms into top-level categories, such as the SSL
Settings alarm. When an alarm triggers, its parent expands to provide more information. As an example, the Disk Full
top-level parent alarm aggregates over multiple partitions. If a specific partition is full, the Disk Full parent alarm
triggers, and the System Status report displays more information regarding which partition caused the alarm to trigger.
Disabling a parent alarm disables its children. You can enable a parent alarm and disable any of its child alarms. You
cannot enable a child alarm without first enabling its parent.
The child alarm of a disabled parent appears on the System Status report with a suppressed status. Disabled children
alarm of an enabled parent appears on the System Status report with a disabled status.
Configuring alarm settingsConfiguring system administrator settings
Beta Draft
2. Under Enable Alarms, complete the configuration as described in this table.
AlarmDescription
Admission ControlEnables an alarm if the AltaVault reaches the maximum number of connections that can be made to
the AltaVault.
By default, this alarm is enabled.
Cloud Bucket
Consistency
Enables an alarm if there is data in the cloud, but the AltaVault data store is empty. To clear this
alarm, enable replication and recovery to ensure that the cloud storage is synchronized with the
data store.
This alarm occurs when you perform disaster recovery without specifying the correct parameters.
Cloud Bucket DisparityEnables an alarm when the cloud bucket that the AltaVault is trying to connect to is being used by
another AltaVault appliance. This alarm prevents corruption of the files in the cloud.
Cloud Bucket Over
Capacity
Enables an alarm when the cloud bucket that the AltaVault connects to has exceeded the licensed
cloud capacity.
CPU Utilization Enables an alarm if the average and peak thresholds for the CPU utilization are exceeded. When an
alarm reaches the rising threshold, it is activated; when it reaches the lowest or reset threshold, it is
reset. After an alarm is triggered, it is not triggered again until it has fallen below the reset
threshold.
If the CPU utilization alarm triggers when the AltaVault is under a heavy load, you can ignore it.
By default, this alarm is enabled.
Rising Threshold - Specify the rising threshold. When an alarm reaches the rising threshold, it is
activated. The default value is 95%.
Reset Threshold - Specify the reset threshold. When an alarm reaches the lowest or reset threshold,
it is reset. After an alarm is triggered, it is not triggered again until it has fallen below the reset
threshold. The default value is 70%.
Data Integrity ErrorEnables an alarm when inconsistency in the data stored on the disk is detected.
Datastore EvictionIndicates that the system has detected an issue with datastore eviction.
The alarm triggers when the appliance starts evicting data from the local disk cache and the age of
the evicted data is relatively young. If disk space runs low, the appliance starts evicting cached data
that has not been used recently, keeping only the most recent data.
The AltaVault keeps statistics about how old the evicted data is (this is the average evicted age).
Usually, only old data is evicted. However, the appliance might be experiencing a large workload
where more recent data needs to be evicted from the appliance to make space for incoming data.
This causes the average evicted age to decrease, and when it goes below a certain threshold, the
average evicted age alarm triggers. This alarm is an anomalous event, signaling that the appliance
is handling a much larger workload than expected.
This alarm is useful in detecting whether the appliance is undersized relative to your normal
workload. If the alarm is constantly triggered, then you should consider increasing
AltaVault’s
disk cache.
Datastore Low SpaceIndicates that the local data store is running out of space and the eviction process on the AltaVault
is unable to run at a sufficient pace to create space on the disk cache.
This alarm might also trigger when replication is too slow.
View the Eviction Optimization report (choose Reports > Eviction) to determine how much disk
cache is available.
Configuring system administrator settingsConfiguring alarm settings
Beta Draft
AlarmDescription
Disk FullEnables an alarm if the system partitions (not the AltaVault data store) are full or almost full. For
example, AltaVault monitors the available space used to hold logs, statistics, system dumps, and
TCP dumps.
By default, this alarm is enabled.
This alarm monitors the following system partitions:
• /boot Full
• /bootmgr Full
• /config Full
• /tmp Full
•/var Full
HardwareFan Error - Enables an alarm when an appliance fan error is detected (the fan is either missing or
running at a low speed).
Battery Backup Unit - Enables an alarm when battery backup unit is detected.
IPMI - Indicates that there has been a physical security intrusion, triggering an Intelligent Platform
Management Interface (IPMI) error. The following events trigger the IPMI alarm:
• Chassis intrusion (physical opening and closing of the appliance case)
• Memory errors (ECC memory errors that can or cannot be corrected)
• Hard drive faults or predictive failures
• Power supply status or predictive failures
The option to reset the alarm appears only after the service triggers the IPMI alarm. To reset the
alarm, click Clear the IPMI alarm now.
Memory Error - Enables an alarm when there is a memory error in one or more memory modules.
Unplug the power cords from the power supply and try reseating the memory.
Power Supply - Enables an alarm when an inserted power supply cord does not have power, as
opposed to a power supply slot with no power supply cord inserted. By default, this alarm is
enabled.
RAID - Indicates that the system has encountered RAID errors.
For drive rebuilds, if a drive is removed and then reinserted, the alarm continues to be triggered
until the rebuild is complete.
Important: Rebuilding a disk drive can take 12 hours or longer.
By default, this alarm is enabled.
You can enable or disable the alarm for a specific RAID disk. To enable or disable an alarm,
choose Settings > Alarms and select or clear the check box next to the RAID disk name. This
alarm monitors and displays the status of the RAID disks.
RAID Integrity Check - Enables an alarm when RAID integrity check is needed.
Shelf Power Supply - Enables an alarm when shelf power supply is needed.
Inconsistent Cloud
Connectivity
Inconsistent Cloud DataEnables an alarm when inconsistency in t
Enables an alarm when the connection to the cloud provider is inconsistent.
he data stored in the cloud is detected.
Configuring alarm settingsConfiguring system administrator settings
Beta Draft
AlarmDescription
LicensingEnables an alarm and sends an email notification if a license on the AltaVault is removed, is about
to expire, has expired, or is invalid.
The licenses expiring and licenses expired alarms are triggered per feature. For example, if you
install two license keys for a feature, AVA-FOO-xxx (expired) and AVA-FOO-yyy (not expired),
the alarms do not trigger, because the feature has one valid license.
By default, this alarm is enabled.
Link DuplexEnables an alarm and sends an email notification when an interface is not configured for half-
duplex negotiation but has negotiated half-duplex mode. Half-duplex significantly limits the
optimization service results.
The alarm displays which interface is triggering the duplex alarm.
By default, this alarm is enabled.
Link I/O ErrorsEnables an alarm and sends an email notification when the link error rate exceeds 0.1% while
Link StateEnables an alarm and sends an email notification if an Ethernet link is lost.
Low MemoryEnables an alarm when there is not enough memory in the system to start the Storage Optimization
Max inodes limitEnables an alarm when the maximum number of files that can be stored has been reached.
Max Pinnable LimitEnables an alarm when the share has reached the maximum pinnable limit. If you configure a share
Memory PagingEnables an alarm when the system has reached the memory paging threshold. If the AltaVault is
either sending or receiving packets. The alarm clears when the rate drops below 0.05%.
You can change the default alarm thresholds by entering the alarm link_errors err-threshold
xxxxx CLI command at the system prompt. For details, see the NetApp AltaVault Cloud Integrated
Storage Command-Line Interface Reference Guide.
By default, this alarm is enabled.
You can enable or disable the alarm for a specific interface. For example, you can disable the alarm
for a link where you have decided to tolerate the errors. To enable or disable an alarm, choose
Settings > Alarms and select or clear the check box next to one or more of the link names.
By default, this alarm is disabled.
You can enable or disable the alarm for a specific interface. To enable or disable an alarm, choose
Settings > Alarms and select or clear the check box next to one or more link names.
Service.
to be pinned, it always has data available locally in the AltaVault; data need not be fetched from the
cloud.
exceeding 100 pages are swapped approximately every two hours, then reboot the AltaVault from
the Maintenance > Reboot/Shutdown page to clear this alarm.
If the memory paging alarm triggers when the AltaVault is under a heavy load, you can ignore it.
Metadata Space FullEnables an alarm when the data reserved for storing system metadata has filled up and leading to
reduced deduplication.
Process Dump Creation
Error
Secure VaultEnables an alarm and sends an email notification if the system encounters a problem with the
Enables an alarm and sends an email notification if the system detects an error while trying to
create a process dump. When the alarm is raised, the directory is blacklisted.
By default, this alarm is enabled.
secure vault:
• Secure Vault Locked - Indicates that the secure vault is locked. To optimize SSL connections or
to use data store encryption, the secure vault must be unlocked. Go to Configure > Secure Vault
and unlock the secure vault.
Configuring system administrator settingsConfiguring alarm settings
Beta Draft
AlarmDescription
SMBEnables an alarm when AltaVault detects the Domain Controller is not reachable.
• Domain Controller Network Status - Indicates the Domain Controller is unreachable. The alarm
is cleared when network connectivity to the Domain Controller is restored. If the alarm is not
cleared after the network connectivity is restored, you can clear the alarm manually using
alarm smb_alarms clear command.
Software update availableEnables an alarm when a new version of the software is available.
Shelf ErrorShelf Missing - This alarm is applicable only to the AltaVault models. The AltaVault Expansion
Shelf is missing or cannot be accessed.
Shelf <shelf name>
• Shelf Inconsistent - The AltaVault Expansion Shelf is not consistent with the stored
configuration.
• Shelf Not Empty - You have added a new AltaVault Expansion Shelf that is not empty. A new
AltaVault Expansion Shelf must be empty before you add it to AltaVault appliance.
• Shelf Not Valid - The AltaVault Expansion Shelf is not a valid shelf. For details, choose
Reports > Storage RAID Groups and click the serial number of the shelf.
Storage Optimization
Service
Storage Optimization
Service Replication
• Storage Optimization Service Down - Enables an alarm and sends an email notification if the
Storage Optimization Service encounters a service condition. By default, this alarm is enabled.
The message indicates the reason for the condition. The following conditions trigger this alarm:
• Configuration errors: examples include no encryption key set, incorrect appliance time, or
incorrect cloud credentials.
• An AltaVault appliance reboot for example, during an appliance software update.
• A system crash due to a power failure
• A Storage Optimization Service restart due to a cloud storage provider change.
• A user enters the CLI command no service enable or shuts down the Storage Optimization
Service from the Management Console
• A user restarts the optimization service from either the Management Console or CLI
• Storage Optimization Service Error - Enables an alarm and sends an email notification if the
Storage Optimization Service encounters a condition that might degrade optimization
performance. By default, this alarm is enabled. Go to the Maintenance > Service page and
restart the optimization service.
• Replication Error - Enables an alarm when the replication to the cloud encounters an error.
Displays an error message that indicates the type of error such as, a file cannot be replicated to
the cloud.
• Replication Paused - Enables an alarm when the replication to the cloud pauses, because there is
a cloud connection error, or you entered the CLI command no replication enable, or because
you are using replication scheduling (nonbandwidth limit type). This alarm warns you that the
AltaVault is not replicating data in the cloud.
Indicates that the space used for internal data structures is full. De-duplication performance is
impacted while the appliance is in this state.
Configuring date and timeConfiguring system administrator settings
Beta Draft
AlarmDescription
Temperature• Critical Temperature - Enables an alarm and sends an email notification if the CPU temperature
exceeds the rising threshold. When the CPU returns to the reset threshold, the critical alarm is
cleared. The default value for the rising threshold temperature is 80º C; the default reset
threshold temperature is 67º C.
• Warning Temperature - Enables an alarm and sends an email notification if the CPU
temperature approaches the rising threshold. When the CPU returns to the reset threshold, the
warning alarm is cleared.
• Rising Threshold - Specifies the rising threshold. The alarm activates when the temperature
exceeds the rising threshold. The default value is 80º C.
• Reset Threshold - Specifies the reset threshold. The alarm clears when the temperature falls
below the reset threshold. The default is 67º C.
After the alarm triggers, it cannot trigger again until after the temperature falls below the reset
threshold and then exceeds the rising threshold again.
Upgrade StatusIndicates the status of the upgrade. By default, this alarm is enabled.
3. Click Apply to apply your changes to the running configuration.
Configuring date and time
You set the system date and time in the Configure > Date and Time page.
You can either set the system date and time by entering it manually, or by assigning an NTP server to the AltaVault.
By default, the appliance uses the NetApp-provided NTP server.
To set the date and time manually
1. Choose Configure > Date and Time.
2. Complete the configuration as described in this table.
ControlDescription
Time ZoneSelect a time zone from the drop-down list.
If you change the time zone, log messages retain the previous time zone until you reboot
the AltaVault.
Set Time ManuallyChange Date - Specify the date in this format: YYYY/MM/DD.
Change Time - Specify military time in this format: HH:MM:SS.
3. Click Apply to apply your changes to the running configuration.
To use Network Time Protocol (NTP) time synchronization
1. Choose Configure > Date and Time.
2. Under Date and Time, select Use NTP Time Synchronization.
3. As a best practice, configure your own internal NTP servers.
Configuring system administrator settingsConfiguring date and time
Beta Draft
Current NTP status
Brief status information appears just below the Use NTP Time Synchronization button. The label Current NTP server
is followed by either a server name or nothing if no NTP server is active.
This information appears after an NTP server name:
Authentication information; “unauthenticated” appears after the server name when it is not using authentication.
When the system has no NTP information about the current server, nothing appears.
When you configure an NTP server pool, the current NTP server that appears after the label Current NTP server never
matches the hostname of the server pool.
NTP MD5-based authentication
NTP authentication verifies the identity of the NTP server sending timing information to the AltaVault. The system
supports MD5-based Message-Digest Algorithm symmetric keys for NTP authentication. MD5 is a widely used
cryptographic hash function that produces a 128-bit (16-byte) hash value.
NTP authentication is optional.
Configuring NTP authentication involves these steps that you can perform in any order:
Configure a key ID and a secret pair.
Configure the NTP server with the key ID.
NTP servers
NetApp recommends synchronizing the AltaVault to an NTP server of your choice.
To add an NTP server
1. Choose Configure > Date and Time.
2. Under Requested NTP Servers, complete the configuration as described in this table.
ControlDescription
Add a New NTP ServerDisplays the controls to add a server.
Hostname or IP AddressSpecify the hostname or IP address for the NTP server.
VersionSelect the NTP server version from the drop-down list: 3 or 4.
Enabled/DisabledSelect Enabled from the drop-down list to connect to the NTP server. Select Disabled
from the drop-down list to disconnect from the NTP server.
Key IDSpecify the MD5 key identifier to use to authenticate the NTP server. The valid range is
1 to 65534. The key ID must appear on the trusted keys list.
AddAdds the NTP server to the server list.
Remove SelectedSelect the check box next to the name and click Remove Selected.
Configuring SNMP basic settingsConfiguring system administrator settings
Beta Draft
NTP authentication keys
NTP authentication uses a key and a shared secret to verify the identity of the NTP server sending timing information to the
AltaVault. The system encrypts the shared secret text using MD5, and uses the authentication key to access the secret.
To add an NTP authentication key
1. Choose Configure > Date and Time.
2. Under NTP Authentication Keys, complete the configuration as described in this table.
ControlDescription
Add a New NTP Authentication KeyDisplays the controls to add an authentication key to the key list. Both trusted and
untrusted keys appear on the list.
Key IDOptionally, specify the secret MD5 key identifier for the NTP server. The valid range is
Key TypeSelect MD5 or SHA1 option.
Secret (Text)Specify the shared secret. You must configure the same shared secret for both the NTP
AddAdds the authentication key to the trusted keys list.
Remove SelectedSelect the check box next to the name and click Remove Selected.
1 to 65534.
server and the NTP client to use MD5-based cryptography.
The shared secret:
• is limited to 16 characters or fewer
• cannot include white space or #s
• cannot be empty
• is case sensitive
The secret appears in the key list as its MD5 hash value.
NTP key information
NTP keys appear in a list that includes the key ID, type, secret (displays as the MD5 hash value), and whether the
system trusts the key for authentication.
Configuring SNMP basic settings
You configure Simple Network Management Protocol (SNMP) contact and trap receiver settings to enable event
reporting to an SNMP entity in the Configure > SNMP Basic page.
Traps are messages sent by an SNMP entity that indicate the occurrence of an event. The default system configuration
does not include SNMP traps.
AltaVault supports the following SNMP Basic settings:
SNMP Version 1
SNMP Version 2c
SNMP Version 3, which provides authentication through the User-based Security Model (USM)
View-Based Access Control Mechanism (VACM), which provides richer access control
Configuring SNMP basic settingsConfiguring system administrator settings
Beta Draft
ControlDescription
Security Level(Appears only when you select v3).Determines whether a single atomic message exchange
is authenticated. Select one of the following settings from the drop-down list:
• No Auth - Does not authenticate packets and does not use privacy. This is the default
setting.
• Auth - Authenticates packets but does not use privacy.
• AuthPriv - Authenticates packets using AES 128 and DES to encrypt messages for
privacy.
A security level applies to a group, not to an individual user.
CommunityFor v1 or v2 trap receivers, specify the SNMP community name. For example, public or
private v3 trap receivers need a remote user with an authentication protocol, a password,
and a security level.
Enable ReceiverSelect to enable the new trap receiver. Clear to disable the receiver.
AddAdds a new trap receiver to the list.
Remove SelectedSelect the check box next to the name and click Remove Selected.
After upgrade, all previous traps and community string intact are visible.
To test an SNMP trap
1. Choose Configure > SNMP Basic.
2. Under SNMP Trap Test, click Run.
Configuring SNMP v3
SNMP v3 provides additional authentication and access control for message security. For example, you can verify the
identity of the SNMP entity (manager or agent) sending the message.
Using SNMP v3 is more secure than SNMP v1 or v2; however, it requires more configuration steps to provide the
additional security features.
Basic steps
1. Create the SNMP-server users. Users can be authenticated using either a password or a key.
2. Configure SNMP-server views to define which part of the SNMP MIB tree are visible.
3. Configure SNMP-server groups, which map users to views, allowing you to control who can view what SNMP
information.
4. Configure the SNMP-server access policies that contain a set of rules defining access rights. Based on these rules,
the entity decides how to process a given request.
Configuring SNMP basic settingsConfiguring system administrator settings
Beta Draft
SNMP authentication and access control
The features on this page apply to SNMP v1, v2c, and v3 unless noted otherwise:
Security Names - Identify an individual user (v1 or v2c only).
Secure Groups - Identify a security-name, security model by a group, and referred to by a group-name.
Secure Views - Create a custom view using the View-based Access Control Model (VACM) that controls who
can access which MIB objects under agent management by including or excluding specific Object Identifiers
(OIDs). For example, some users have access to critical read-write control data, while some users have access
only to read-only data.
Security Models - A security model identifies the SNMP version associated with a user for the group in which the
user resides.
Secure Access Policies - Defines who gets access to which type of information. An access policy contains
Configuring system administrator settingsConfiguring SNMP basic settings
Beta Draft
2. Under Security Names, complete the configuration as described in this table.
ControlDescription
Add a New Security
Displays the controls to add a security name.
Name
Security NameSpecify a name to identify a requestor allowed to issue gets and sets (v1 and v2c only). The
specified requestor can make changes to the view-based access-control model (VACM) security
name configuration.
Community strings do not allow printable 7-bit ASCII characters, except for spaces.
Also, community strings cannot begin with '#' or '-' (hash or hyphen).
This control does not apply to SNMPv3 queries. To restrict v3 USM users from polling a particular
subnet, use the Management ACL feature.
Traps for v1 and v2c are independent of the security name.
Community StringSpecify the password-like community string to control access using a combination of uppercase,
lowercase, and numerical characters to reduce the chance of unauthorized access to the
AltaVault.
Community strings do not allow printable 7-bit ASCII characters, except for spaces. Also, the
community strings cannot begin with '#' and '-'.
If you specify a read-only community string (located in the SNMP Basic page under SNMP Server
Settings), it takes precedence over this community name and allows users to access the entire MIB
tree from any source host. If this is not desired, delete the read-only community string.
To create multiple SNMP community strings on a
AltaVault, leave the default public community
string and then create a second read-only community string with a different security name. Or, you
can delete the default public string and create two new SNMP access control lists (ACLs) with
unique names.
Source IP Address and
Mask Bits
Specify the host IP address and mask bits to which you permit access using the security name and
community string.
AddAdds the security name.
Remove SelectedSelect the check box next to the name and click Remove Selected.
3. Click Apply to apply your changes to the running configuration.
To set secure groups
1. Choose Configure > SNMP ACLs.
2. Under Groups, complete the configuration as described in this table.
.
ControlDescription
Add a New GroupDisplays the controls to add a new group
Group Name Specify a group name.
Security Model and Name
Pairs
AddAdds the group name and security model and name pairs.
Remove SelectedSelect the check box next to the name and click Remove Selected.
Click the + button and select a security model from the drop-down list:
• v1 or v2c - displays another drop-down list; select a security name.
• v3 (usm) - displays another drop-down list, select a user.
To add another Security Model and Name pair, click the plus sign (+).
Configuring system administrator settingsConfiguring email settings
Beta Draft
Configuring email settings
You can set email notification parameters for events and failures in the Configure > Email page.
By default, email addresses are not specified for event and failure notification.
To set event and failure email notification
1. Choose Configure > Email.
2. Under Email Notification, complete the configuration as described in this table.
ControlDescription
SMTP ServerSpecify the SMTP server. You must have external DNS and external access for SMTP traffic for
SMTP PortSpecify the port number for the SMTP server.
Report Events via EmailSpecify this option to report events through email. Specify a list of email addresses to receive the
Report Failures via EmailSpecify this option to report failures through email. Specify a list of email addresses to receive the
Override Default Sender’s
Address
this feature to function.
Make sure you provide a valid SMTP server to ensure that the users you specify receive email
notifications for events and failures.
notification messages. Separate addresses by spaces, semicolons, commas, or vertical bars.
notification messages. Separate addresses by spaces, semicolons, commas, or vertical bars.
Select this option to configure the SMTP protocol for outgoing server messages for errors or
events. Specify a list of email addresses to receive the notification messages. Separate addresses by
commas.
You can also configure the outgoing email address sent to the client recipients. The default
outgoing address is do-not-reply@hostname.domain. If you do not specify a domain the default
outgoing email is do-not-reply@hostname.
3. Click Apply to apply your changes to the running configuration.
Configuring log settings
You set up local and remote logging in the Configure > Logging page.
By default, the system rotates each log file every 24-hours or if the file size reaches one Gigabyte uncompressed. You
can change this to rotate every week or month and you can rotate the files based on file size.
The automatic rotation of system logs deletes your oldest log file, labeled as Archived log #10, pushes the current log
to Archived log # 1, and starts a new current-day log file.
To set up logging
1. Choose Configure > Logging.
2. To rotate the logs immediately, under Log Actions at the bottom of the page, click Rotate Logs. After the logs are
Configuring log settingsConfiguring system administrator settings
Beta Draft
You can also schedule a log rotation based on time or the amount of disk space the log uses, described next.
3. Under Logging Configuration, complete the configuration as described in this table.
ControlDescription
Minimum SeveritySelect the minimum severity level for the system log messages. The log contains all messages with
this severity level or higher. Select one of the following levels from the drop-down list:
• Emergency - Emergency, the system is unusable.
• Alert - Action must be taken immediately.
• Critical - Conditions that affect the functionality of the AltaVault.
• Error - Conditions that probably affect the functionality of the AltaVault.
• Warning - Conditions that could affect the functionality of the AltaVault, such as authentication
failures.
• Notice - Normal but significant conditions, such as a configuration change.
• Info - Informational messages that provide general information about system operations. This is
the default setting.
This control applies to the system log only. It does not apply to the user log.
Maximum Number of
Specify the maximum number of logs to store. The default value is 10.
Log Files
Lines Per Log PageSpecify the number of lines displayed per page when viewing the logs. The default value is 100.
Rotate Based OnSpecifies the rotation option:
• Time - Select Day, Week, or Month from the drop-down list. The default setting is Day.
• Disk Space - Specify how much disk space, in megabytes, the log uses before it rotates. The
default value is 16 MB.
The log file size is checked at 10-minute intervals. If there is an unusually large amount of logging
activity, it is possible for a log file to grow larger than the set disk space limit in that period of time.
4. Click Apply to apply your changes to the running configuration.
To add or remove a log server
1. Under Remote Log Servers, complete the configuration as described in this table.
ControlDescription
Add a New Log ServerDisplays the controls for configuring new log servers.
Configuring system administrator settingsConfiguring log settings
Beta Draft
ControlDescription
Minimum SeveritySelect the minimum severity level for the log messages. The log contains all messages with this
severity level or higher. Select one of the following levels from the drop-down list:
• Emergency - Emergency, the system is unusable.
• Alert - Action must be taken immediately.
• Critical - Conditions that affect the functionality of the AltaVault.
• Error - Conditions that probably affect the functionality of the AltaVault.
• Warning - Conditions that could affect the functionality of the AltaVault, such as authentication
failures.
• Notice - Normal but significant conditions, such as a configuration change. This is the default
setting.
• Info - Informational messages that provide general information about system operations.
AddAdds the server to the list.
Remove SelectedSelect the check box next to the name and click Remove Selected.
2. Click Apply to apply your changes to the running configuration.
Filtering logs by application or process
You can filter a log by one or more applications or one or more processes. This is particularly useful when capturing
data at a lower severity level at which the AltaVault might not be able to sustain the flow of logging data that the service
is committing to disk.
Log filters enable you to specify the logging level of individual processes independently.
Configuring log settingsConfiguring system administrator settings
Beta Draft
2. Under Per-Process Logging, complete the configuration as described in this table.
ControlDescription
Add a New Process
Logging Filter
ProcessSelect a process to include in the log from the drop-down list:
Minimum SeveritySelect the minimum severity level for the log messages. The log contains all messages with this
Displays the controls for adding a process-level logging filter.
• alarmd - Alarm Manager.
• cli - Command Line Interface.
• hald - Hardware abstraction daemon, which handles access to the hardware.
• Isiraidd - LSI raid daemon.
• mgmtd - Device control and management, which directs the entire device management system.
It handles message passing between various management daemons, managing system
configuration and general application of system configuration on the hardware underneath
through the hardware abstraction layer daemon (HALD).
• pm - Process Manager, which handles launching of internal system daemons and keeps them
running.
• sched - Process Scheduler that handles one-time scheduled events.
• statsd - Statistics Collector that handles the statistics.
• wdt - Watchdog Timer, the motherboard watchdog daemon.
• webasd - Web Application Process, which handles the Web user interface.
severity level or higher. Select one of the following levels from the drop-down list:
• Emergency - Emergency, the system is unusable. This is the default setting.
• Alert - Action must be taken immediately.
• Critical - Conditions that affect the functionality of the AltaVault.
• Error - Conditions that probably affect the functionality of the AltaVault.
• Warning - Conditions that could affect the functionality of the AltaVault, such authentication
failures.
• Notice - Normal but significant conditions, such as a configuration change.
• Info - Informational messages that provide general information about system operations.
AddAdds the filter to the list, after which it logs at the selected severity and higher.
Remove SelectedSelect the check box next to the name and click Remove Selected to remove the filter.
3. Click Apply to apply your changes to the running configuration.
“Configuring general security settings” on page 79
“Managing user permissions” on page 81
“Configuring management login from Active Directory domain” on page 86
“Setting RADIUS servers” on page 87
“Configuring TACACS+ access” on page 88
“Unlocking the secure vault” on page 89
“Configuring Web settings” on page 90
“Configuring KMIP” on page 93
“Configuring appliance monitoring” on page 97
“Configuring a management ACL” on page 99
“Configuring SSH Access” on page 100
Configuring general security settings
You can prioritize local, RADIUS, and TACACS+ authentication methods for the system and set the authorization
policy and default user for RADIUS and TACACS+ authorization systems in the Configure > General Settings page.
Make sure to put the authentication methods in the order in which you want authentication to occur. If authorization
fails on the first method, the next method is attempted until all of the methods have been attempted.
To set TACACS+ authorization levels (admin or read-only) to allow certain members of a group to log in, add the
following attribute to users on the TACACS+ server:
service = rbt-exec {
local-user-name = “monitor”
}
Configuring security settingsConfiguring general security settings
Beta Draft
2. Under Authentication Methods, complete the configuration as described in this table.
ControlDescription
Authentication MethodsSelect an authentication method from the drop-down list. The methods are listed in the
order in which they occur. If authorization fails on the first method, the next method is
attempted until all of the methods have been attempted.
Note: Prior to selecting the Kerberos/AD Only method, the AltaVault must have joined
the AD domain and have created an administrator user account.
For RADIUS/TACACS+, fallback
only when servers are unavailable
Specifies that the AltaVault uses a RADIUS or TACACS+ server only when all other
servers do not respond. Enabled is the default setting.
Authorization PolicyAppears only for some Authentication Methods. Optionally, select one of the following
policies from the drop-down list:
• Remote First - Checks for an authentication policy on the remote server first and only
checks locally if the remote server does not have a policy set.
• Remote Only- Only check the remote server. This is the default.
• Local Only - Checks only the local server. All remote users are mapped to the user
specified. Any vendor attributes received by an authentication server are ignored.
Default UserOptionally, select Admin or Monitor from the drop-down list to define the default
authentication policy.
3. Click Apply to apply your changes to the running configuration.
Managing user permissionsConfiguring security settings
Beta Draft
Managing user permissions
You can change the administrator or monitor passwords and define role-based users in the Configure > User
Permissions page.
There are two types of accounts:
“Capability-based accounts” on page 81
“Role-based accounts” on page 81
Capability-based accounts
The system has two built-in accounts, based on what actions you can take:
Admin - The administrator user has full privileges. For example, as an administrator you can set and modify
configuration settings, add and delete users, restart the AltaVault service, reboot the AltaVault, and create and
view performance and system reports.
Monitor -Monitor users can view reports and user logs and change their own password. A monitor user cannot
make configuration changes.
Role-based accounts
Use the role-based management feature of AltaVault to specify what roles a user is assigned to, and what actions a user
is permitted to perform on the appliance in each of those roles. You can specify role-based accounts for admin settings,
general settings, prepopulation (prepop) settings, replication settings, report settings, security settings, and storage
settings in the AltaVault.
A role-based account cannot modify another role-based or capability-based account. Only the Admin account and
accounts with the admin settings role can create and modify role-based accounts.
This section describes the roles that you can assign for specific features.
Admin settings
You can assign users permissions to perform administrator activities, including creating and deleting other users. Users
with the Admin role always have read/write permission for all other roles, even if those other roles explicitly indicate
Deny for the user.
General settings
You can assign users permissions to configure the following General Settings:
Software upgrades
Licenses
Email, SNMP settings, and Web settings.
Hardware RAID settings
Shelf settings
Starting and stopping the Storage Optimization Service
Managing user permissionsConfiguring security settings
Beta Draft
SMB
NFS
OST
SnapMirror
Configuring permissions for user roles
You can specify the following permissions for each role:
Deny - You cannot view settings or make configuration changes for a feature.
Read-Only - You can view current configuration settings but not change them.
Read/Write - You can view settings and make configuration changes for a feature.
To configure user permissions
1. Choose Configure > User Permissions.
2. Under Capability-Based Accounts, complete the configuration as described in this table.
ControlDescription
admin/monitorClick the magnifying glass icon to change the administrator or monitor password.
Enable Account - Click the check box to enable or disable the administrator or monitor account.
Change Password - Select the check box to change password protection.
• New Password - Specify a password in the text box. The password cannot be “password” or any
case combination of “password” for any user including admin and root. You will be prompted
with the following message: Password “password” and its case combinations are not allowed.
The password must be at least 6 characters long.
• New Password Confirm - Confirm the new administrator password.
3. Under Role-Based Accounts, complete the configuration as described in this table.
ControlDescription
Add a New UserClick to display the controls for creating a new role-based account.
Account NameSpecify a name for the role-based account.
Note: If you are creating a user role for management login from the Active Directory domain, the
name you enter must be the same as the user name in the Active Directory.
PasswordSpecify the new password. The password cannot be “password” or any case combination of
“password” for any user including admin and root and must be at least 6 characters long.
This password can be different from the AD password.
Configuring security settingsManaging user permissions
Beta Draft
ControlDescription
External Authentication
Only
Enable AccountSelect the check box to enable the new role-based account.
Roles and PermissionsFor the account being created, specify the desired permissions for each role. Click Select All to
AddAdds your settings to the system.
Remove Selected UsersSelect the check box next to the name and click Remove Selected.
If this option is selected, then this user can only be authenticated via external authentication
methods. If Kerberos/AD authentication is enabled, the local password originally configured for a
user is no longer retained by AltaVault. If you disable external authentication, you will need to
create a new password.
choose the given access level for all feature settings.
Unlocking an account
AltaVault temporarily locks out an account after a user exceeds the configured number of login attempts. Account
lockout information appears on the Configure > User Permissions page.
When an account is locked out, the lockout ends after:
The configured lockout time elapses.
—or—
The administrator unlocks the account. AltaVault never locks out the capability-based admin account.
To unlock an account
1. Log in as admin or any role-based user with read/write permission for the admin role.
2. Choose Configure > User Permissions.
3. Select the user to display Edit User section.
4. Click Clear Login Failure Details to unlock the user account.
When you log in to your account successfully, AltaVault resets the login failure count.
Managing user permissionsConfiguring security settings
Beta Draft
Configuring password policy settings
You configure password complexity and lockout requirements for local management logins using Password Policy
settings.
To configure password policy
1. Choose Configure > User Permissions.
2. Click Password Policy at the bottom of the page.
3. Select Enable Account Control.
4. Optionally, you can choose to populate the password settings with a predetermined set of values.
To see these values, move your cursor over each of the template options: Strong Security Template or Basic
Security Template. The default values appear next to each field. Click on a template to select it.
For new installations, the password settings are prepopulated with basic security values.
5. Specify values for each of the following settings (default values shown):
Login attempts before lockout (no limit)
Timeout for user login after lockout (seconds) (300)
Days before password expires (no limit)
Days to warn user of an expiring password (no limit) - takes effect after setting Days before password expires
Days to keep account active after password expires (no limit)
Days between password changes (no limit)
Minimum Interval for password reuse (0)
Minimum password length (6)
Minimum uppercase characters (0)
Minimum lowercase characters (0)
Minimum numerical characters (0)
Minimum special characters (0)
Minimum character difference between passwords (0)
Maximum consecutively repeating characters (no limit)
Configuring security settingsConfiguring management login from Active Directory domain
Beta Draft
Configuring management login from Active Directory domain
AltaVault supports management login from either the Management Console (UI) or command-line interface (CLI) for
domain users using their Active Directory (AD) credentials.
Note: The built-in AltaVault admin and monitor user accounts cannot be used for AD login. After AD login is enabled, you will not
be able to log in using the built-in admin or monitor account. Management login from the AD domain requires you to add user
accounts with the read/write permission for the Admin settings role.
This section covers the following information:
“Configuring login from AD” on page 86
“Login behavior using AD” on page 87
Configuring login from AD
To configure management login via Active Directory
1. From the Management Console, choose Configure > Host Settings.
2. In the DNS settings area, specify the DNS servers that can contact the domain controllers used by AltaVault. The
preferred domain controllers AltaVault can use are specified in the next steps.
3. From the Management Console, choose Configure > SMB.
4. If not already configured, select Domain and complete the domain configuration as described in “To configure an
Active Directory domain,” then click Join Domain.
For Username, you can enter any user that has administrator privileges to join the domain.
5. From the Management Console, choose Configure > User Permissions.
6. Under Role-based Accounts, select Add a New User and enter a user name and password. The user name must
map to that of an existing user in the AD domain. Do not qualify the user name with a domain name. For example,
“user” is acceptable, but DOMAIN\user or user@DOMAIN is not.
7. Under Roles and Permissions, select the roles and permissions provided to the user.
To enable AD login, you must assign this user with the Admin role and read and write permissions. This user will
then have privileges to add, delete or change permissions for other users.
8. Click Add to save user roles and permissions.
9. Repeat steps 6 through 8 to add additional users.
10. From the Management Console, choose Configure > General Settings.
11. Under Authentication Methods, select Kerberos/AD Only from the drop down menu and click Apply to save your
settings and enable management login from AD.
Note: You must have joined the AD domain and have created an admin user account prior to setting the authentication method.
12. Optionally, if your security policy requires that user passwords cannot be stored locally, choose Configure > User permissions from the Management Console. Select the user you wish to edit, and check the box External
Authentication Only.
When this box is checked, the local password for this user is deleted from AltaVault and you must log in using
AD credentials.
13. Optionally, to further limit AltaVault logins to use AD credentials only, disable SSH public key authentication in
the CLI:
no ssh server pub-key-auth
Login behavior using AD
After enabling Kerberos for Active Directory login, accessing AltaVault has the following behaviors:
Password authentication will be checked against Active Directory credentials, not local passwords.
If the user password is changed in Active Directory, that user must log in using the new Active Directory
password.
If user is disabled or deleted in Active Directory, that user will not be able to log in to the AltaVault. To avoid
losing access to the AltaVault, it is recommended that you configure more than one Admin user account for
Active Directory access.
AltaVault supports only individual Active Directory user accounts.
Setting RADIUS servers
You can optionally configure Remote Authentication Dial-in User Server (RADIUS) server authentication in the
Configure > RADIUS page.
RADIUS is an access control protocol that uses a challenge and response method for authenticating users.
To configure RADIUS server authentication
1. Choose Configure > RADIUS.
2. Under Default RADIUS Settings, complete the configuration as described in this table.
ControlDescription
Set a Global Default KeyEnables a global server key for the RADIUS server.
Timeout (seconds)Specify the time-out period in seconds (1 to 60). The default value is 3.
RetriesSpecify the number of times that you want to allow the user to retry authentication. The default
value is 1.
3. Click Apply to apply your changes to the running configuration.
4. To add a new RADIUS server, complete the configuration as described in this table.
ControlDescription
Add a RADIUS ServerDisplays the controls for defining a new RADIUS server.
Hostname or IP AddressSpecify the hostname or IP address.
Authentication PortSpecify the port for the server.
Authentication TypeSelect one of these authentication types:
• PAP - Password authentication protocol (PAP), which validates users before allowing them
access to the RADIUS server resources. PAP is the most flexible protocol but is less secure than
CHAP.
• CHAP - Challenge-Handshake Authentication Protocol (CHAP), which provides better security
than PAP. CHAP validates the identity of remote clients by periodically verifying the identity of
the client using a three-way handshake. This happens at the time of establishing the initial link
and might happen again at any time afterwards. CHAP bases verification on a user password
and transmits an MD5 sum of the password from the client to the server.
Override the Global
Default Key
Timeout (seconds)Specify the time-out period in seconds (1 to 60). The default value is 3.
RetriesSpecify the number of times that you want to allow the user to retry authentication. Valid values
EnabledSelect the check box to enable the new server.
AddAdds the RADIUS server to the list.
Remove SelectedSelect the check box next to the name and click Remove Selected.
Select this check box to override the global server key for the server and specify the following:
• Server Key - Specify the override server key.
• Confirm Server Key - Confirm the override server key.
are 0 to 5. The default value is 1.
If you add a new server to your network and you do not specify these fields at that time, the global settings are
applied automatically.
Configuring TACACS+ access
You can optionally set up TACACS+ (Terminal Access Controller Access-Control System) server authentication in
the Configure > TACACS+ page.
TACACS+ is an authentication protocol that allows a remote access server to forward a login password for a user to
an authentication server to determine whether access is allowed to a given system.
You can prioritize local, RADIUS, and TACACS+ authentication methods for the system and set the authorization
policy and default user for RADIUS and TACACS+ authorization systems in the General Settings page.
Unlocking the secure vaultConfiguring security settings
Beta Draft
To configure a TACACS+ server
1. Choose Configure > TACACS+.
2. Under Default TACACS+ Settings, complete the configuration as described in this table.
ControlDescription
Set a Global Default KeyEnables a global server key for the server.
Global KeySpecify the global server key.
Confirm Global KeyConfirms the global server key.
Timeout (seconds)Specify the time-out period in seconds (1 to 60). The default value is 3.
RetriesSpecify the number of times you want to allow the user to retry authentication. Valid values are 0
to 5. The default is 1.
3. Click Apply to apply your changes to the running configuration.
4. To add or remove a TACACS+ server, complete the configuration as described in this table.
ControlDescription
Add a TACACS+ ServerDisplays the controls for defining a new TACACS+ server.
Hostname or IP AddressSpecify the hostname or server IP address.
Authentication PortSpecify the port for the server. The default value is 49.
Authentication TypeSelect either PAP or ASCII as the authentication type. The default value is PAP.
Override the Global Default
Key
Server KeySpecify the override server key.
Confirm Server KeyConfirm the override server key.
Timeout (seconds)Specify the time-out period in seconds (1 to 60). The default is 3.
RetriesSpecify the number of times you want to allow the user to retry authentication. Valid values are
EnabledEnables the new server.
AddAdds the TACACS+ server to the list.
Remove SelectedSelect the check box next to the name and click Remove Selected.
Specify this option to override the global server key for the server.
0 to 5. The default is 1.
If you add a new server to your network and you do not specify these fields, the system automatically applies the
default settings.
Unlocking the secure vault
The secure vault contains sensitive information from your AltaVault configuration, including the encryption key.
These configuration settings are encrypted on the disk at all times, using 256-bit AES encryption.
You can unlock and change the password for the secure vault in the Secure Vault page.
Configuring security settingsConfiguring Web settings
Beta Draft
Initially, the secure vault is keyed with a default password known only to the AltaVault software. This allows the
AltaVault to automatically unlock the vault during system startup. You can change the password, but the secure vault
does not automatically unlock on startup. If not using the default password, the user will need to provide the password
to unlock secure vault. To use encryption, the secure vault must be unlocked.
If a password policy is enabled, the number of retries allowed for unlocking the secure vault is the same as the number
of retries for locking out a user. The lockout duration is also the same as set in the password policy. To change the
password policy, choose Configure > User Permissions and select Password Policy as the bottom of the page.
To unlock or change the password of the secure vault
1. Choose Configure > Secure Vault.
2. Under Unlock Secure Vault, complete the configuration as described in this table.
ControlDescription
PasswordType a password and click Unlock Secure Vault.
Initially, the secure vault is keyed with a default password known only to the AltaVault
software. This allows the system to automatically unlock the vault during system startup.
You can change the password, but the secure vault does not automatically unlock on
startup.
Unlock Secure VaultUnlocks the vault.
3. Under Change Password, complete the configuration as described in this table.
ControlDescription
Current PasswordSpecify the current password. If you are changing the password that ships with the
New PasswordSpecify a new password for the secure vault.
New Password ConfirmConfirm the new password for the secure vault.
Change PasswordChanges the password for the secure vault.
product, leave the text box blank.
Configuring Web settings
You can modify Management Console Web user interface settings in the Configure > Web Settings page. For
information on managing Web SSL certificates, see “Managing web SSL certificates” on page 91.
To modify web settings
1. Choose Configure > Web Settings.
2. Under Web Settings, complete the configuration as described in this table.
ControlDescription
Default Web Login IDSpecify the username that appears in the authentication page. The default value is admin.
Configuring Web settingsConfiguring security settings
Beta Draft
ControlDescription
Web Inactivity Timeout
(minutes)
Allow Session Timeouts
When Viewing AutoRefreshing Pages
Specify the number of idle minutes before time-out. The default value is 15. A value of 0 disables
time-out.
By default, session time-out is enabled. Clear the Allow box to disable the session time-out and
remain logged-in indefinitely.
Disabling this feature is not recommended and can pose a security risk.
3. Click Apply to apply your changes to the running configuration.
Managing web SSL certificates
The AltaVault provides the following additional security features to manage SSL certificates used by the AltaVault
Management Console Web user interface using HTTPS.
Generate the certificate and key pairs on the AltaVault. This overwrites the existing certificate and key pair
regardless of whether the previous certificate and key pair was self-signed or user added. The new self-signed
certificate lasts for one year (365 days).
Create certificate signing requests from the certificate and key pairs.
Replace a signed certificate with one created by an administrator or generated by a third-party certificate
authority.
To modify web SSL certificates
1. Choose Configure > Web Settings.
2. Under Web Certificate, select the Details tab.
The AltaVault identity certificate details appear, as described in this table.
ControlDescription
Issued To/Issued ByCommon Name - Specifies the common name of the certificate authority.
Email - Specifies the email address of the contact person.
Organization - Specifies the organization name (for example, the company).
Locality - Specifies the city.
State - Specifies the state.
Country - Specifies the country.
ValidityIssued On - Specifies the date the certificate was issued.
Expires On - Specifies the date the certificate expires.
Configuring security settingsConfiguring Web settings
Beta Draft
3. To import certificate and private key, under Web Certificate, select the Replace tab and complete the configuration
as described in this table.
ControlDescription
Import Certificate and Private KeySelect this option to import certificate and private key.
Upload (PKCS-12, PEM or DER formats) - Select this option to upload the CA-signed
certificate file. The page displays a CA-Signed Public Certificate control for browsing to
the key and certificate files or a text box for copying and pasting the key and certificate.
Paste it here (PEM only) - Select this option to paste the CA-signed certificate.
Private Key - Select an option from the following:
• This private key is in a separate file (below)
• This file includes the certificate and private key
• The private key for this certificate was created with a CSR generated on this appliance
Separate Private KeyUpload (PEM or DER formats) - Select this option to upload the private key file. The
Import Certificate and KeyImports the new private key and certificate.
page displays a Private Key control for browsing to the key or a text box for copying and
pasting the key. Click Browse to navigate to the file.
Paste it here (PEM only) - Select this option to paste the private key.
Decryption password - Specify the decryption password. It is required for PKCS-12 files.
4. To generate self-signed certificate and new private key, under Web Certificates, select the Replaces tab and
complete the configuration as described in this table.
ControlDescription
Organization NameSpecify the organization name (for example, the company).
Organization Unit NameSpecify the organization unit name (for example, the section or department).
LocalitySpecify the city.
State Specify the state. Do not abbreviate.
Country Specify the country (2-letter code only).
Email AddressSpecify the email address of the contact person.
Validity PeriodSpecify the validity period. You can select from 60 to 3650 days.
Cipher:RSASelect the cipher from the drop-down list.
Generate CSRGenerates the Certificate Signing Request.
5. To generate a CSR, under Web Certificate, select the Generate CSR tab and complete the configuration as
described in this table.
ControlDescription
Common NameSpecify the common name.
Organization NameSpecify the organization name (for example, the company).
Organization Unit NameSpecify the organization unit name (for example, the section or department).
Email AddressSpecify the email address of the contact person.
Generate CSRGenerates the Certificate Signing Request.
6. Click Apply to apply your changes to the running configuration.
7. To view PEM information, under Web Certificate, select the PEM tab.
Configuring KMIP
Key Management Interoperability Protocol (KMIP) is a standard describing communication between key management
servers and their clients. AltaVault manages several important pieces of information that must be kept secure. These
pieces include the datastore encryption key that encrypts user data and cloud credentials (which allow AltaVault to
authenticate itself to the cloud provider). Without KMIP, these pieces of information are stored on a disk in an
encrypted partition of AltaVault called the Secure Vault. They can also be exported in configuration archives. It is up
to the user to keep these archives secure.
A user’s environment may be running multiple AltaVault’s as well as other appliances or services which also require
own encryption keys and other sensitive information. The need for centralized key management has led to
development of key management servers (KMS), which operates as the KMIP server.
During setup, the administrator specifies an external KMS to manage AltaVault’s keys and cloud authentication
parameters. The datastore encryption key and/or cloud authentication parameters will then be managed by the KMS.
If AltaVault uses KMIP, the KMS must be running nominally in order for AltaVault to be accessible.
AltaVault implements the following KMIP functionality:
Registering keys with a KMS
Fetching previously registered keys from a KMS
Note: Keys retrieved from a key server are never stored on a disk, only in memory. You cannot export fetched keys from a key
server.
AddAdds the KMIP keys to the AltaVault. The KMIP key displays in the table below.
Remove SelectedSelect a KMIP key and click Remove Selected to delete.
To configure cloud settings
1. Choose Configure > Cloud Settings.
2. Select Cloud tab.
3. Select your cloud provider.
4. Select Yes from the Use Keys from KMIP Server drop-down list.
5. Select the correct secret data object names for each cloud authentication parameter (Access Key and Secret Key).
6. Click Apply to save your settings.
7. Select Maintenance > Service, and select Start to start the Storage Optimization Service.
To configure the encryption key
1. Choose Configure > Cloud Settings.
2. Select Encryption tab.
3. Select yes from the drop-down list.
4. Select the symmetric key name that corresponds to the AES-256 key.
Using CLI to configure KMIP
You can use CLI to configure KMIP. For more information, see the NetApp AltaVault Cloud Integrated Storage
Command-Line Reference Guide available on the NetApp Support at https://mysupport.netapp.com
Documentation tab.
under the
Troubleshooting KMIP
KMIP commands are normally used by the AltaVault to the KMIP server in two situations: when the service comes up
(most common) and when an object is registered with the server. Activity from these actions are recorded by AltaVault
in the Maintenance > System Logs page.
Example of an unsuccessful command (failure to connect)
Common Errors
An authentication error could be caused the following:
Incorrect username or password
Incorrect client certificate.
Misconfigured certificates.
Configuring appliance monitoring
You can set up any AltaVault as the monitoring master appliance that monitors peer AltaVaults. The AltaVault uses
REST APIs that you can access to set up peer appliance monitoring.
After you configure REST API access and add the API access code for the monitored appliance, the Appliance
Monitoring report enables you to view the health status, disk space, and cloud service status of the AltaVault.
The monitoring appliance probes the monitored peer appliances every 60 seconds by default.
To configure REST API Access
When you add an appliance to be monitored by the AltaVault, you must generate an API access code to enable
authenticated communication between the monitoring master appliance and the monitored peer appliance.
Configuring a management ACLConfiguring security settings
Beta Draft
Configuring a management ACL
You can secure access to the AltaVault using an internal management Access Control List (ACL) in the Configure >
Management ACL page. For information on the ACL rules, see “ACL Management Rules” on page 99.
Using an internal management ACL, you can:
restrict access to certain interfaces or protocols of an appliance.
restrict inbound IP access to the AltaVault, protecting it from access by hosts that do not have permission.
specify which hosts or groups of hosts can access and manage the AltaVault by IP address.
The Management ACL provides the following safeguards to prevent accidental disconnection from the AltaVault:
It detects the IP address you are connecting from and displays a warning if you add a rule that denies connections
to that address.
It converts well-known port and protocol combinations such as SSH, Telnet, HTTP, HTTPS, SNMP, and SOAP
into their default management service and protects these services from disconnection. For example, if you specify
protocol 6 (TCP) and port 22, the management ACL converts this port and protocol combination into SSH and
protects it from denial.
It tracks changes to default service ports and automatically updates any references to changed ports in the access
rules.
To set up a management ACL
1. Choose Configure > Management ACL.
2. Under Management ACL Settings, complete the configuration as described in this table.
ControlDescription
Enable Management ACL Select the check box to secure access to a AltaVault using a management ACL.
3. Click Apply to apply your changes to the running configuration.
If you add, delete, or modify a rule that could disconnect connections to the AltaVault, a warning message
appears. Click Confirm to override the warning and allow the rule definition anyway. Use caution when
overriding a disconnect warning.
ACL Management Rules
The management ACL contains rules that define a match condition for an inbound IP packet. You set a rule to allow
or deny access to a matching inbound IP packet. When you add a rule on a AltaVault, the destination specifies the
AltaVault
Protocol(Appears only when Service is set to Specify Protocol.) Optionally, select All, TCP,
Source NetworkOptionally, specify the source subnet of the inbound packet. For example, 1.2.3.0/24.
Destination PortOptionally, specify the destination port of the inbound packet, either a single port value
InterfaceOptionally, select an interface name from the drop-down list. Select All to specify all
DescriptionOptionally, describe the rule to facilitate administration.
Rule NumberOptionally, select a rule number from the drop-down list. By default, the rule goes to
Log PacketsTracks denied packets in the log. By default, packet logging is enabled.
When specified, the Destination Port is dimmed and unavailable.
UDP, or ICMP from the drop-down list. The default setting is All. When set to All or
ICMP, the Service and Destination Ports are dimmed and unavailable.
or a port range of port1-port2, where port1 must be less than port2. Leave it blank to
specify all ports.
interfaces.
the end of the table (just above the default rule).
AltaVaults evaluate rules in numerical order starting with rule 1. If the conditions set in
the rule match, then the rule is applied, and the system moves on to the next packet. If
the conditions set in the rule do not match, the system consults the next rule. For
example, if the conditions of rule 1 do not match, rule 2 is consulted. If rule 2 matches
the conditions, it is applied, and no further rules are consulted.
The default rule, Allow, which allows all remaining traffic from everywhere that has
not been selected by another rule, cannot be removed and is always listed last.
AddAdds the rule to the list. The Management Console redisplays the Rules table and
applies your modifications to the running configuration, which is stored in memory.
Remove SelectedSelect the check box next to the name and click Remove Selected.
Move SelectedMoves the selected rules. Click the arrow next to the desired rule position; the rule
moves to the new position.
Configuring SSH Access
AltaVault supports SSH access to the management port of the appliance. SSH access can be done using either user
credentials (username/password) or the client public key. This section describes how to use AltaVault CLI commands
to the configure SSH access using public keys.
To enable SSH access via public key
1. Log in to the AltaVault with the login name and password.