Avamar
7.0
Extended Retention
Security Guide
P/N 300-015-244
REV 01
EMC Avamar 7.0 Extended Retention Security Guide 2
Copyright 2001- 2013 EMC Corporation. All rights reserved. Published in the USA.
Published July, 2013
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without
notice.
The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect
to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular
purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC
2
, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries.
All other trademarks used herein are the property of their respective owners.
For the most up-to-date regulatory document for your product line, go to the technical documentation and advisories section on the
EMC online support website.
EMC Avamar 7.0 Extended Retention Security Guide 3
CONTENTS
Preface
Chapter 1 Security Configuration
Access control............................................................................................. 10
Default accounts................................................................................... 10
Authentication configuration................................................................. 10
User authorization................................................................................. 10
Component access control .................................................................... 10
Certificate management ........................................................................ 11
Lockbox management ........................................................................... 13
Log settings ................................................................................................ 14
Communication security.............................................................................. 14
Port usage............................................................................................. 14
Network encryption............................................................................... 15
Data security............................................................................................... 15
Secure serviceability ................................................................................... 15
The Lockbox tool ......................................................................................... 16
Running the Lockbox tool ...................................................................... 16
Lockbox tool examples.......................................................................... 18
4 EMC Avamar 7.0 Extended Retention Security Guide
Contents
EMC Avamar 7.0 Extended Retention Security Guide 5
PREFACE
As part of an effort to improve its product lines, EMC periodically releases revisions of its
software and hardware. Therefore, some functions described in this document might not
be supported by all versions of the software or hardware currently in use. The product
release notes provide the most up-to-date information on product features.
Contact your EMC representative if a product does not function properly or does not
function as described in this document.
Note: This document was accurate at publication time. New versions of this document
might be released on the EMC online support website. Check the EMC online support
website to ensure that you are using the latest version of this document.
Purpose
This document describes how to configure security features for the EMC Avamar extended
retention feature.
Audience
This document is intended for the host system administrator, system programmer, or
operator who will be involved in managing the Avamar extended retention feature.
Revision history
The following table presents the revision history of this document.
Related documentation
The following EMC publications provide additional information:
EMC Avamar 7.0 Extended Retention User Guide
EMC Avamar 7.0 Extended Retention Release Notes
EMC Avamar 7.0 Media Access Node Customer Hardware Installation Guide
EMC Avamar Compatibility and Interoperability Matrix
EMC Avamar Data Store Gen4 Customer Service Guide
EMC Avamar Data Store Site Prep Technical Specifications
Table 1 Revision history
Revision Date Description
01 July 10, 2013 Initial release of Avamar 7.0.
6 EMC Avamar 7.0 Extended Retention Security Guide
Conventions used in this document
EMC uses the following conventions for special notices:
DANGER indicates a hazardous situation which, if not avoided, will result in death or
serious injury.
WARNING indicates a hazardous situation which, if not avoided, could result in death or
serious injury.
CAUTION, used with the safety alert symbol, indicates a hazardous situation which, if not
avoided, could result in minor or moderate injury.