Setting up a secure (SSL) connection
You can use a Secure Sockets Layer (SSL) certificate to create a secure, encrypted connection between the storage system and the management client.
Setting up SSL communications
Before you enable SSL encryption, you must create a private key and a public key to establish a secure communication session.
The following figure shows the procedure to set up SSL communication. Unless otherwise noted, all steps are required. Note that creation of private and public keys requires a dedicated program. You can download a program for creating private and public keys from the OpenSSL website (http://www.openssl.org/).
SSL encryption of the storage system
The storage systems can use SSL encryption for all connection paths, as shown in the following figure and table. The encryption protocol used for SSL encryption is TLS version 1.2.
- A: Path between the management client and the storage system.
- B: Path between the SVP and the management client.
- C: Path between the SVP and the storage system.
- D: Path between the management client and the storage system.
Management model | Path | Description | Cipher suites |
Using embedded interfaces | A | Between management PC and storage system |
|
Using Device Manager - Storage Navigator | B | Between the SVP and client PC |
|
C | Between the SVP and the storage system |
| |
D | Between the client PC and storage system |
|
- Using Internet Explorer: Click Tool > Internet Option, go to the Advanced tab, and then select Use TLS 1.2.
- Using Firefox: Enter a about:config into the address bar, open the configuration editor (about: config page), and set the value of
security.tls.version.max
to 3. - Using Google Chrome: Click Chrome menu > Settings > Show advanced settings > Advanced settings, and then select Use TLS 1.2.
To prevent a man-in-the middle attack, the SSL encryption on path B (between the SVP and storage system) verifies the validity of the connection by using the certificate that was uploaded to the SVP in advance and by using the certificate of the storage system. The same certificate must be uploaded to the SVP and the storage system.
- If a certificate for the SVP or the storage system is changed, the SVP does not operate normally. Upload the certificate to the storage system before uploading the certificate to the SVP.
- Different certificates can be used to connect to the SVP and web server.
Certificate | Upload destination | Comments |
A signed certificate of SSL encryption between the SVP and client PC | SVP | N/A |
For connecting to the SVP* | SVP and storage system | If a certificate for the SVP or the storage system was uploaded, the SVP will not operate normally. |
For connecting to the web server* | SVP and storage system | If a certificate for the SVP or storage system was uploaded, the SVP will not operate normally. |
* You can use the same certificate for connecting to the SVP and connecting to the web server. |
Setting up SSL encryption using Device Manager - Storage Navigator
To improve security of remote operations from a Device Manager - Storage Navigator SVP to a storage system, you can set up Secure Sockets Layer (SSL) encrypted communication. By setting SSL encryption, the Device Manager - Storage Navigator User ID and Password are encrypted.
SSL communication can be established between the management client and the SVP using the protocols and port numbers specified in the following table.
Protocol | Port Number |
HTTPS | 443 |
RMI | 1099 |
RMI | 51100-51355 When a storage system is registered, an unused port number in this range is automatically allocated, and a firewall is set. The allocated port number is used when the storage system starts. |
SMI-S | 5989-6244 When a storage system is registered, an unused port number in this range is automatically allocated, and a firewall is set. The allocated port number is used when the storage system starts. |
SSL communication can be established between the following servers and the SVP:
- Key management server
- External authentication or authorization server
- Hitachi Ops Center server
- Hitachi Command Suite server
- BasicConstraints
- KeyUsage
- SubjectKeyIdentifier
In addition, if you use a key management server (KMS) and an external authentication or authorization server for VSP E series with DKCMAIN firmware version 93-06-22 or later, the following extensions are also supported:
- Authority Key Identifier
- Certificate Policies
- Subject Alternative Name
- Name Constraints
- Policy Constraints
- Extended Key Usage
- Inhibit anyPolicy
Do not use an extension other than those listed above.
Creating a keypair
To enable SSL, you must create a keypair consisting of a public and a private key on the management client. The instructions use Windows 8.1 as an example.
Creating a private key using the OpenSSL command
A private key is required to create an SSL keypair. The following procedure for Windows systems creates a private key file called server.key in the c:\key folder.
Before you begin
Procedure
When you install OpenSSL, if the read-only attribute is set, release it from the c:\openssl folder. (This step is not necessary if you use OpenSSL on the SVP.)
Open a command prompt with administrator permissions.
Move the current directory to the folder to which the key file is output (such as
c:\key
), and execute the following command.When OpenSSL is installed:
C:\key>c:\openssl\bin\openssl genrsa -out server.key 2048
When using OpenSSL on the SVP:
C:\key>c:\Mapp\OSS\apache\bin\openssl genrsa -out server.key 2048
Creating a public key using the OpenSSL command
A public key, which has the file extension .csr, is required to create an SSL keypair. The following procedure is for the Windows operating system.
Before you begin
Download openssl.exe
from the
OpenSSL website or determine to use OpenSSL on the SVP.
Procedure
Open a command prompt with administrator permissions.
Execute the following command:
When OpenSSL is installed:C:\key>c:\openssl\bin\openssl req -sha256 -new -key server.key -config c:\openssl\bin\openssl.cnf -out server.csr
When using OpenSSL on the SVP:
C:\Key>c:\Mapp\OSS\apache\bin\openssl req -sha256 -new -key server.key -config c:\Mapp\OSS\apache\conf\openssl.cnf -out server.csr
NoteC:\Mapp indicates the installation directory for the storage management software and SVP software. Specify C:\Mapp for the installation directory if another directory is specified for the installation directory.NoteThis command uses SHA-256 as a hash algorithm.- Use SHA-256 for the hash algorithm. Do not use MD5 or SHA-1 for the hash algorithm due to its low security level.
- When you use OpenSSL on the SVP, do not change the contents of c:\Mapp\OSS\apache\conf\openssl.cnf.
Enter the following information in the prompt:
- Country Name (two-letter code)
- State or Province Name
- Locality Name
- Organization Name
- Organization Unit Name
- Common Name
To create a self-signed certificate, enter the IP address of the SVP or GUM. The name you entered here is used as the server name (host name). To obtain a signed and trusted certificate, ensure that the server name is the same as the host name.
- Email Address
- Challenge password (optional)
- Company name (optional)
The following example shows the contents of a command window when you create a public key.
......++++++ ..++++++ is 65537 (0x10001) C:\key>c:\openssl\bin\openssl req -sha256 -new -key server.key -config c You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. \openssl\bin\openssl.cfg -out server.csr For some fields there will be a default value. If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:JP State or Province Name (full name) [Some-State]:Kanagawa Locality Name (eg, city) []:Odawara Organization Name (eg, company) [Internet Widgits Pty Ltd]:Hitachi Organization Unit Name (eg, section) []:ITPD Common Name (eg, YOUR name) []:192.168.0.1 Email Address []: Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []:
Obtaining a signed certificate
After creating a private key and public key, obtain a signed public key certificate file. You can use any of these methods to obtain a signed certificate file.
- Create a certificate by self-signing. See Obtaining a self-signed certificate .
- Obtain a certificate from the certificate authority that is used by your company.
- Request an official certificate from an SSL certificate authority. See Obtaining a signed and trusted certificate.
When you send a request to a certificate authority, specify the SVP or GUM as the host name.
Hitachi recommends that self-signed certificates be used only for testing encrypted communication.
Obtaining a self-signed certificate
To obtain a self-signed certificate, open a command prompt and execute the following command:
When OpenSSL is installed:
C:\key>c:\openssl\bin\openssl x509 -req -sha256 -days 10000 -in server.csr -signkey server.key -out server.crt
When using OpenSSL on the SVP:
C:\key>c:\Mapp\OSS\apache\bin\openssl x509 -req -sha256 -days 10000 -in server.csr -signkey server.key -out server.crt
This command creates a server.crt
file in the
c:\key
folder,
which is valid for 10,000 days. This is the signed private key, which is also
referred to as a self-signed certificate.
Obtaining a signed and trusted certificate
To obtain a signed and trusted certificate, you must obtain a certificate signing request (CSR), send that file to a Certificate Authority (CA), and request that the CA issue a signed and trusted certificate. Each certificate authority has its own procedures and requirements. Use of this certificate results in higher reliability in exchange for greater cost and requirements. The signed and trusted certificate is the signed public key.
Before uploading the SSL certificate
Before uploading the SSL certificate to the SVP or management client, perform the following tasks:
- If the passphrase is set, an SSL certificate cannot be applied for the SVP. You must release the passphrase for the SSL certificate before applying the SSL certificate to the SVP. For instructions, see Releasing an SSL certificate passphrase.
- If you are uploading a created private key and the SSL certificate to the management client, you need to convert the SSL certificate to PKCS#12 format. For instructions, see Converting the SSL certificates to PKCS#12 format.
Releasing an SSL certificate passphrase
An SSL certificate cannot be uploaded to the SVP if the passphrase is set. If the passphrase is set, use the following procedure to release the passphrase for the SSL certificate before applying it to the SVP.
Before you begin
- The private key (
server.key
file) must have been created. - OpenSSL must be installed. In this procedure, it is installed in
C:\openssl
. - All users must be logged out of Device Manager - Storage Navigator.
Procedure
On the SVP, open a command prompt with administrator permissions.
Move the current directory to the folder containing the key file (for example, C:\key).
Execute the following command.
CautionExecuting this command will overwrite the current key file. To prevent loss of the key file, either back up the key file before executing the following command, or specify a different key file input destination and output destination when executing the following command.When OpenSSL is installed:
C:\key>c:\openssl\bin\openssl rsa -in key-file-input-destination -out key-file-output-destination
When using OpenSSL on the SVP:
C:\key>c:\Mapp\OSS\apache\bin\openssl rsa -in key-file-input-destination -out key-file-output-destination
Note C:\Mapp indicates the installation directory for the storage management software and SVP software. If you specified a different installation directory, replaceC:\Mapp
with the specified installation directory.When
The passphrase in the SSL private key is released, and the SSL certificate can be applied to the SVP.Enter pass phrase for server.key:
is displayed, enter the passphrase.
C:\key>c:\openssl\bin\openssl rsa -in server.key -out server.key
Enter pass phrase for server.key: "Enter passphrase"
Writing RSA key
C:\key>c:\openssl\bin\openssl rsa -in server.key –out server.key
Writing RSA key
Converting the SSL certificates to PKCS#12 format
Uploaded SSL certificates need to be in PKCS#12 format.
If you are uploading a created private key and the SSL certificate to the management client, you need to convert the SSL certificate to PKCS#12 format. If you are not uploading the SSL certificate, conversion is not required.
Before you begin
- You must store a private key and SSL certificate in the same folder.
- In the following procedure:
- The private key file name is “client.key”.
- The SSL certificate file name is “client.crt”.
- The SSL certificate in PKCS#12 format is output to c:\key.
- If you update SSL certificates in a batch, conversion is not required.
Procedure
Open a command prompt with administrator permissions.
Enter the following command:
When OpenSSL is installed:
C:\key>c:\openssl\bin\openssl pkcs12 -export -in client.crt -inkey client.key -out client.p12
When using OpenSSL on the SVP:
C:\key>c:\Mapp\OSS\apache\bin\openssl pkcs12 -export -in client.crt -inkey client.key -out client.p12
NoteC:\Mapp indicates the installation directory for the storage management software and SVP software. Specify C:\Mapp for the installation directory if another directory is specified for the installation directory.Enter a password, which is used when uploading the SSL certificate in PKCS#12 format. You can use up to 128 alphanumeric characters and the following symbols: ! # $ % & ' ( ) * + , - . / : ; < = > ? @ [ \ ] ^ _ ` { | } ~
The client.p12 file is created in the C:\key folder. This client.p12 file is the SSL certificate in PKCS#12 format.
Close the command prompt.
Uploading the SSL certificate to the SVP or management client
Before you begin
- You must have the Storage Administrator (Initial Configuration) role to perform this task.
- You must be logged in to the SVP or management client.
- A private key (.key file) has been created. Make sure that the file name is server.key.
- A signed public key certificate (.crt file) has been acquired. Make sure that the file name is server.crt.
- The private key (.key file) must be in PEM format. You cannot use DER format.
- The signed public key certificate (.crt file) must be in X509 PEM format. You cannot use X509 DER format.
- The passphrase for the private key (server.key file) must be released.
- If an intermediate certificate exists, you must prepare a signed public key certificate (server.crt file) in a certificate chain that contains the intermediate certificate.
- The number of tiers of the certificate chain for the certificate to be uploaded must be 5 tiers or less including the root CA certificate.
- The public key of the certificate to be uploaded must be RSA.
Procedure
In the maintenance utility Menu navigation tree, click System Management.
Click Update Certificate Files.
NoteFor storage systems without an SVP, unselect the Connect to SVP box.Select the Web Server checkbox, then click Browse.
Browse to the certificate file and click Open. The File Upload window closes and returns you to the Update Certificate Files dialog box.
Click Apply.
Uploading the signed certificate for SSL communication between the SVP and management client to the SVP
The extended profile fields in the X.509 certificate support the following items as specified in RFC5280:
- BasicConstraints
- KeyUsage
- SubjectKeyIdentifier
- SubjectAltName
Before you begin
- The private key (
server.key
file) must have been created. If the file name is notserver.key
, rename it toserver.key
. - The signed public key certificate (
server.crt
file) must have been obtained. If the file name is notserver.crt
, rename it toserver.crt
. - The private key (
server.key
file) and the signed public key certificate (server.crt
file) must be in X509 PEM format. Do not use a certificate in X509 DER format. - If an intermediate certificate exists, you must prepare a signed public key certificate (
server.crt
file) in a certificate chain that contains the intermediate certificate. - The certificate chain for the certificate to be uploaded must have 5 tiers or fewer including the root CA certificate.
- The following GUM firmware version is required to update a certificate file to a certificate file in a certificate chain that contains the intermediate certificate and root CA certificate:
- 93-02-01-xx/xx or later
- The public key encryption method for the certificate to be uploaded must be RSA.
- All users must be logged out of Device Manager - Storage Navigator.
Procedure
On the SVP, start a Windows command prompt as Administrator.
Move the current directory to the directory containing the certificate update tool
MappApacheCrtUpdate.bat
.Run the following commands:
cd /d C:\Mapp\wk\Supervisor\MappIniSet MappApacheCrtUpdate.bat absolute-path-of-the-certificate-file absolute-path-of-the-private-key-file
NoteIn this command,C:\MAPP
indicates the installation directory of the storage management software and SVP software. If the installation directory is notC:\Mapp
, replaceC:\Mapp
with your installation directory.When prompted, press any key to continue.
When the processing is complete, you can close the command prompt.
Uploading the certificates for “Connect to SVP” and “Web server” to the storage system
Before uploading the SSL certificate, you must upload and update the certificate for “Connect to SVP” and the certificate for “Web server” that are used for SSL communications between the management client and the storage system and between the SVP and the storage system.
The extended profile fields in the X.509 certificate support the following items as specified in RFC5280:
- BasicConstraints
- KeyUsage
- SubjectKeyIdentifier
Before you begin
- The certificate files must be in PKCS#12 format.
- If you have a server certificate file and a private key file that are in PEM format, you need to convert the certificates to PKCS#12 format. Also, register the server certificate files before conversion in the SVP.
- If an intermediate certificate exists, you must prepare a signed public key certificate in a certificate chain that contains the intermediate certificate.
- The number of tiers of the certificate chain for the certificate to be uploaded must be 5 tiers or less including the root CA certificate.
- The following GUM firmware version is required to update a certificate file to a certificate file in a certificate chain that contains the intermediate certificate and CA certificate:
- 93-02-01-xx/xx or later
- The public key encryption method for the certificate to be uploaded must be RSA.
Procedure
In the maintenance utility Menu navigation tree, click .
Select the check box for the certificate you want to update, and then specify the certificate file.
- If you are using Hitachi Storage Advisor Embedded, select Web Server.NoteIf the storage system does not have an SVP, make sure to clear (uncheck) the check box for Connect to SVP.
- If you are using Hitachi Device Manager - Storage Navigator, select Web Server or Connect to SVP.
- If you are using Hitachi Storage Advisor Embedded, select Web Server.
Confirm the settings, and then click Apply.
When the completion message appears, close the dialog box.
Uploading the certificate for “Connect to SVP” to the SVP
The extended profile fields in the X.509 certificate support the following items as specified in RFC5280:
- BasicConstraints
- KeyUsage
- SubjectKeyIdentifier
Before you begin
- The private key for the storage system and the signed public key certificate must be updated in the maintenance utility.
- The signed public key certificate (
server.crt
file) must be in X509 PEM format. - If an intermediate certificate exists, you must prepare a signed public key certificate (
server.crt
file) in a certificate chain that contains the intermediate certificate. - The number of tiers of the certificate chain for the certificate to be uploaded must be 5 tiers or less including the root CA certificate.
- The following GUM firmware version is required to update a certificate file to a certificate file in a certificate chain that contains the intermediate certificate and CA certificate:
- 93-02-01-xx/xx or later
- The public key encryption method for the certificate to be uploaded must be RSA.
- All users must be logged out of Device Manager - Storage Navigator.
Procedure
On the SVP, start a Windows command prompt as Administrator.
Move the current directory to the directory containing the tool
MappL7SwitchGumSslCrtUpdate.bat
.Run the following commands:
cd /d C:\Mapp\wk\Supervisor\MappIniSet MappL7SwitchGumSslCrtUpdate.bat absolute-path-of-the-certificate-file
NoteIn this command,C:\MAPP
indicates the installation directory of the storage management software and SVP software. If the installation directory is notC:\Mapp
, replaceC:\Mapp
with your installation directory.When prompted, press any key to continue.
When the processing is complete, you can close the command prompt.
Uploading the web server certificate to the SVP
The extended profile fields in the X.509 certificate support the following items as specified in RFC5280:
- BasicConstraints
- KeyUsage
- SubjectKeyIdentifier
Use the following procedure to upload the certificate using the certificate update tool.
Before you begin
- The private key for the web server and the signed public key certificate must be updated in the maintenance utility.
- The private key (
server.key
file) and signed public key certificate (server.crt
file) must be in X509 PEM format or X509 DER format. - If an intermediate certificate exists, you must prepare a signed public key certificate (
server.crt
file) in a certificate chain that contains the intermediate certificate. - The number of tiers of the certificate chain for the certificate to be uploaded must be 5 tiers or less including the root CA certificate.
- The GUM firmware version 93-02-01 or later is required to update a certificate file to a certificate file in a certificate chain that contains the intermediate certificate and root CA certificate.
- The public key encryption method for the certificate to be uploaded must be RSA.
- All users must be logged out of Device Manager - Storage Navigator.
Procedure
On the SVP, start a Windows command prompt as Administrator.
Move the current directory to the directory containing the certificate update tool (MappSn2GumSslCrtUpdate.bat).
Run the following command:
C:\MAPP\wk\Supervisor\MappIniSet\ MappSn2GumSslCrtUpdate.bat r[absolute path of the certificate file]
NoteIn this command,C:\MAPP
indicates the installation directory of the storage management software and SVP software. If the installation directory is notC:\Mapp
, replaceC:\Mapp
with your installation directory.When prompted, press any key to continue.
When the processing is complete, you can close the command prompt.
Next steps
Checking the web server certificate uploaded to the SVP
Log in to Device Manager - Storage Navigator.
In the Device Manager - Storage Navigator main window, click
.Check that the Maintenance Utility window opens.
If the Maintenance Utility window opens, the certificate for connecting to the web server is valid.
If the error message 20122-207001 is displayed, the certificate uploaded to the SVP and the storage system might not be valid. Take the following actions:
Verify that the certificate meets the requirements (see Setting up SSL communications). If not, create a certificate that meets the requirements.
Retry the operations. See Uploading the certificates for “Connect to SVP” and “Web server” to the storage system.
Retry the operations. See Uploading the web server certificate to the SVP.
Importing the SSL certificate to the Web browser
To allow your Web browser to automatically trust SSL certificates, you can import the SSL certificate into your Web browser.
Consult your Web browser's documentation for instructions to import the SSL certificate to the Web browser.
Blocking HTTP communication to the SVP
Before you begin
- You must have the Storage Administrator (Initial Configuration) role to perform this task.
- You must be logged in to the SVP.
Procedure
Verify that HTTP communication is not already blocked by checking HTTP Blocking in the Storage Device List window on the SVP.
- release: HTTP communication to the SVP is not blocked.
- block: HTTP communication to the SVP is blocked.
The value displayed in HTTP Blocking is updated periodically. Wait for a few minutes after changing the setting, or click the refresh button in the Storage Device List window.
HTTP Blocking is displayed when the storage management software version is 93-06-01 or later. For software versions that do not display HTTP Blocking, connect HDvM - SN using the HTTP protocol from the management client, and then check HTTP Blocking.
Close all management client sessions on the storage system, including Storage Advisor Embedded, maintenance utility, and HDvM - SN.
Open a command prompt window with administrator permissions.
Move the current directory to the folder containing the SVP configuration tool (for example, C:\MAPP\wk\Supervisor\MappIniSet), and then execute the following command:
MappHttpBlock.bat
When the completion message appears, press any key to acknowledge the message and close the message box.
Close the command prompt window.
Releasing HTTP communication blocking
Before you begin
- You must have the Storage Administrator (Initial Configuration) role to perform this task.
- You must be logged into the SVP or management client.
Procedure
Close all management client sessions on the storage system, including Storage Advisor Embedded, maintenance utility, and Device Manager - Storage Navigator.
Open a command prompt window with administrator permissions.
Move the current directory to the folder containing the SVP configuration tool (for example, C:\MAPP\wk\Supervisor\MappIniSet), and then execute the following command:
MappHttpRelease.bat
When the completion message appears, press any key to acknowledge the message and close the message box.
Close the command prompt window.
Setting SSL/TLS communications using Device Manager - Storage Navigator
Use the following procedure to create the security settings used for SSL/TLS communications with the SVP.
- If an SSL/TLS communication setting is not correct, SSL/TLS communication with the SVP might fail. If SSL communication fails, you need to configure the security settings again using the Tool Panel dialog box by using HTTP connection. Therefore, it is recommended to release the HTTP communication blocking using the Tool Panel dialog box before making security settings. For more information about how to release the HTTP communication blocking, see Releasing HTTP communication blocking.
- When you perform this procedure, use HTTPS connection for access. If you access via an HTTP connection, the ID and password used for login are communicated in clear text.
Before you begin
- Verify the security settings of the SVP communication destination before the setting. If the protocol is TLS1.3 only, make sure that the communication destination supports TLS1.3.
If you use Device Manager - Storage Navigator with Adobe AIR, you must enable TLS1.2. Adobe AIR does not support TLS1.3.
- Verify that no other management or maintenance operations are being performed onDevice Manager - Storage Navigator.
- You must have Security Administrator (View & Modify) role to perform this task.
Procedure
Close all Device Manager - Storage Navigator sessions on the SVP.
On the management client, open a web browser, and then type the following URL to open the Tool Panel dialog box by using HTTPS connection.
https://IP-address-or-host-name-of-SVP/cgi-bin/utility/toolpanel.cgiIn the Tool Panel dialog box, click TLS Security Settings to open the TLS Security Settings login dialog box.
If SSL/TLS communication has been established, the Security Alert dialog box opens before the login dialog box opens. In the Security Alert dialog box, click OK.If the Security Alert dialog box for the certificate opens, click View Certificate to display the certificate, confirm that the certificate is correct, and then click Yes.
In the TLS Security Settings login dialog box, enter the administrator user ID and password, and then click Login.
In the TLS Security Settings dialog box, enter the required items.
CautionWhen using TLS1.2, select the cipher suites corresponding to the key type of the certificate uploaded to the SVP.- If the key type is RSA, select a cipher suite whose name contains “RSA”.
- If the key type is ECDSA, select a cipher suite whose name contains “ECDSA”.
If the cipher suites are not set correctly, the SSL/TLS communications with the SVP fail, and then a problem, such as a Device Manager - Storage Navigator login error, occurs.
When using TLS1.3, you can select both cipher suites regardless of whether the certificate key type is RSA or ECDSA.
In the TLS Security Settings dialog box, confirm the messages about the possible TLS communication failures and recommendations, and then select the check box for I understood that I canceled HTTP blocking or TLS communication might fail.
Click Next to perform a communication test. The Communication Test dialog box for TLS Security Settings opens.
The communication test using the security settings specified in step 5 starts automatically for the following communication paths:
- SVP – Syslog Server
- SVP – Key Management Server
- SVP – LDAP Server
- SVP – HCS server
Verify the results of the communication test for each communication path performed in the previous step. In the Communication Test dialog box for TLS Security Settings, wait until any of the following is displayed as the communication test result:
- Normal: Communication is complete correctly.
- Skipped: Connection settings are not made on Device Manager - Storage Navigator.
- Error:Communication failed.
Confirm the communication test result, and then click Submit in the Communication Test dialog box for TLS Security Settings.
When prompted if you are sure you want to change the settings, click OK.
The SVP web server restarts to reflect the security settings. When the SVP Web server restart is complete, the setting completion dialog box for TLS Security Settings opens.Click OK to return to the login dialog box.
Back up the new security settings. For details, see Backing up HDvM - SN configuration files.
Managing SSL certificates
When you use encrypted SSL communications to manage your storage system, you can select the desired cipher suite, update a signed certificate, and return an updated certificate to default.
SSL connection protects the User IDs and passwords that are exchanged when users log in to the management client.
Selecting a cipher suite
- If you set protocols between the SVP and the storage system, the setting operation on the SVP is also necessary.
- After you select a cipher suite, the available cipher suites differ, depending on the connection path for SSL communications.
Before you begin
You must have the Storage Administrator (View & Modify) role to complete this procedure.
Procedure
In the maintenance utility Menu navigation tree, click System Management.
Click Select Cipher Suite.
Select the type of communication to use between the management client and the storage system.
The selections change the encryption level. Higher encryption provides better security but the communication speed is slower. After you select a cipher suite, the available cipher suites differ depending on the connection path for SSL communications.- TLS_RSA_WITH_AES_128_CBC_SHA (Prioritize Transmission Speed): This selection provides higher communication speed and lower security.
- TLS_RSA_WITH_AES_128_CBC_SHA256 (Prioritize Security): This selection provides higher security and lower communication speed.
- TLS_RSA_WITH_AES_128_CBC_SHA256
- TLS_RSA_WITH_AES_128_CBC_SHA
If you do not use either of these cipher suites, disable the cipher suites for RSA key exchange on the SVP.
Click Apply to save the setting and close the dialog box.
Checking the certificate for SSL communications between the SVP and the management client
You can use a web browser on the management client to check the following information about the certificate for SSL communications between the SVP and the management client:
- Issued to: <name or url>
- Issued by: <name or url>
- Valid from <date> to <date>
Checking the certificate for SSL communications using Internet Explorer
Before you begin
The SVP must be running.
Procedure
Launch Internet Explorer on the management client, and then enter the IP address of the SVP.
https://IP-address-of-the-SVP
If the port number of the HTTPS service on the SVP has been changed from the initial value "443", enter the following in the URL bar:
https://IP-address-of-the-SVP:port-number-of-the-HTTPS-service
Select the command bar in Internet Explorer.
If the command bar is not displayed in an Internet Explorer window, right-click the top edge of the window, and then select Command bar.From the command bar, select Certificates.
In either of the following cases, the default certificate is used. , and then click- The following information is displayed in the General tab, and “00dc52873fdb5cc76b” is displayed for Serial number in the Details tab:
Issued to: Hitachi.Ltd. Issued by: Hitachi.Ltd. Valid from 18/14/2014 to 18/04/2024
- The following information is displayed in the General tab:
Issued to: www.example.com Issued by: www.example.com Valid from DD/MM/YYYY to DD/MM/YYYY
Note that the valid period differs depending on the SVP software version.
- The following information is displayed in the General tab, and “00dc52873fdb5cc76b” is displayed for Serial number in the Details tab:
Checking the certificate for SSL communications using Google Chrome
Before you begin
The SVP must be running.
Procedure
Launch Google Chrome on the management client, and then enter the IP address of the SVP.
https://IP-address-of-the-SVP
If the port number of the HTTPS service on the SVP has been changed from the initial value "443", enter the following in the URL bar:
https://IP-address-of-the-SVP:port-number-of-the-HTTPS-service
Right-click in a Google Chrome window, select Inspect, and then select the Security tab.
In the Security overview area, click View certificate.
In either of the following cases, the default certificate is used.- The following information is displayed in the General tab, and “00dc52873fdb5cc76b” is displayed for Serial number in the Details tab:
Issued to: Hitachi.Ltd. Issued by: Hitachi.Ltd. Valid from 18/14/2014 to 18/04/2024
- The following information is displayed in the General tab:
Issued to: www.example.com Issued by: www.example.com Valid from DD/MM/YYYY to DD/MM/YYYY
Note that the valid period differs depending on the SVP software version.
- The following information is displayed in the General tab, and “00dc52873fdb5cc76b” is displayed for Serial number in the Details tab:
Updating a signed certificate
The extended profile fields in the X.509 certificate support the following items as specified in RFC5280:
- BasicConstraints
- KeyUsage
- SubjectKeyIdentifier
- subjectAltName
- While the SVP certificate is being updated, tasks that are being run or scheduled to run on Device Manager - Storage Navigator are not executed.
- Certificates for RMI communication are updated asynchronously. The process takes about 2 minutes.
- If the SVP certificate is updated while Ops Center Administrator or Hitachi Command Suite is being set up, the setup operation will fail.
- Updating the SSL certificate might change the system drastically and could lead to SVP failure. Make sure to consider carefully the content of the certificate and private key to be set.
- After the certificate update is complete, the SVP can take 30 to 60 minutes to restart depending on the environment.
Before you begin
- You must have the Storage Administrator (Initial Configuration) role to perform this task.
- You must be logged in to the SVP or management client.
- A private key (.key file) has been created. Make sure that the file name is server.key.
- The passphrase for the private key (server.key file) is released.
- A signed public key certificate (.crt file) has been acquired. Make sure that the file name is server.crt.
- The private key (.key file) must be in PEM format. You cannot use DER format.
- The signed public key certificate (.crt file) must be in X509 PEM format. You cannot use X509 DER format.
- The passphrase for the private key (server.key file) must be released.
Procedure
Close all management client sessions on the storage system, including Storage Advisor Embedded, maintenance utility, and Device Manager - Storage Navigator.
Open a command prompt window with administrator permissions.
Move the current directory to folder containing the SVP configuration tool (for example, C:\MAPP\wk\Supervisor\MappIniSet), and then execute the following command:
MappApacheCrtUpdate.bat absolute-path-of-signed-public-key-certification-file absolute-path-of-private-key-file
Note- A space is required between
MappApacheCrtUpdate.bat
and the signed public key certification file path. - A space is required between the signed public key certification file path and the private key file path.
- A space is required between
When the completion message appears, press any key to acknowledge the message and close the message box.
Close the command prompt window.
Returning the certificate to default
You can return the certificate that was updated by the procedure in Updating a signed certificate back to default.
Before you begin
- You must have the Storage Administrator (Initial Configuration) role to perform this task.
- You must be logged into the management client.
- A private key (.key file) has been created. Make sure that the file name is server.key. See Creating a private key using the OpenSSL command.
- The passphrase for the private key (server.key file) is released.
- A signed public key certificate (.crt file) has been acquired. Make sure that the file name is server.crt. See Creating a public key using the OpenSSL command.
- The private key (.key file) must be in PEM format. You cannot use DER format.
- The signed public key certificate (.crt file) must be in X509 PEM format. You cannot use X509 DER format. See Obtaining a self-signed certificate .
- The extended profile fields in the X.509 certificate support the following items
as specified in RFC5280:
- BasicConstraints
- KeyUsage
- SubjectKeyIdentifier
- subjectAltName
- The passphrase for the private key (server.key file) must be released.
Procedure
Close all management client sessions on the storage system, including Storage Advisor Embedded, maintenance utility, and Device Manager - Storage Navigator.
Open a command prompt window with administrator permissions.
Move the current directory to the folder containing the SVP configuration tool (for example, C:\MAPP\wk\Supervisor\MappIniSet), and then execute the following command:
MappApacheCrtInit.bat
When the completion message appears, press any key to acknowledge the message and close the message box.
Close the command prompt window.
Messages about website security certificates
When the message "There is a problem with this website's security certificate." is displayed, click Continue to this website (not recommended).
When you are using encrypted SSL communications to connect to the storage system, the browser displays a warning message if the security certificate is not issued by a trusted certificate authority. This warning message also appears when the IP address or host name specified in the URL does not match the CN listed in the security certificate.
If this warning message starts to appear after an update of the storage management software, check to see if the SSL certificate returned to the default. If the SSL certificate has returned to the default, install the certificate file that was backed up when the storage management software was updated.
Updating the certificate files
The Update Certificate Files window is used to update the certificates that are used for communication between the management client and the storage system.
Before you begin
- You must have the Storage Administrator (View & Modify) role to complete this procedure.
Procedure
In the maintenance utility Menu navigation tree, click System Management.
Click Update Certificate Files.
NoteFor storage systems without an SVP, unselect the Connect to SVP box.To update the certificate file on the management client:
Select the Web Server checkbox, then click Browse.
Browse to the certificate file and click Open. The File Upload window closes and returns you to the Update Certificate Files dialog box.
In the Web Server Password: field, enter the certificate password.
Enter the password again in the Web Server Re-enter Password: field.
NoteFor storage systems without an SVP, continue to step 5.To update the certificate file on the SVP:
Select the Connect to SVP checkbox, then click Browse.
Browse to the certificate file and click Open. The File Upload window closes and returns you to the Update Certificate Files dialog box.
In the Connect to SVP Password: field, enter the certificate password.
Enter the password again in the Connect to SVP Re-enter Password: field.
Click Apply to update the certificates.
Updating SSL certificates for the SVP and storage system in a batch
If only one storage system is registered in the SVP, you can update the following SSL certificates in a batch:
- Signed certificate for SSL communication between the SVP and the management client
- Certificate for connecting to the SVP
- Certificate for connecting to the web server on the storage system
- BasicConstraints
- KeyUsage
- SubjectKeyIdentifier
- subjectAltName
Before you begin
- Ensure that only one storage system is registered in the SVP.
- A private key for external communication between the SVP and the management client has been created.
- A signed public key certificate for external communication between the SVP and the management client has been acquired.
- A private key for internal communication for connecting to the SVP or web server and a signed public key certificate must be X509 PEM or X509 DER format.
- All users must be logged out of Hitachi Device Manager - Storage Navigator.
- You must have the Security Administrator (View & Modify) role and Support Personnel (User) role to perform this task.
Create the following parameter file (in JSON format) beforehand. Allowed characters when you specify the path to the certificate in the parameter file are alphanumeric characters, spaces, and symbols: - _ . \ / :.
- "user": "user-name-of-the-account-registered-in-the-storage-system"
- "password": "password-of-the-account-registered-in-the-storage-system"
- "innerConnectionCertPath": "absolute-path-to-the-public-key-certificate-for-internal-communication"
- "innerPrivateKeyPath": "absolute-path-to-the-private-key-for-internal-communication"
- "outerConnectionCertPath": "absolute-path-to-the-public-key-certificate-for-external-communication"
- "outerPrivateKeyPath": "absolute-path-to-the-private-key-for-external-communication"
{ "user": "someuser", "password": "password123", "innerConnectionCertPath": "c:\\sslcert\\innercert.crt", "innerPrivateKeyPath": "c:\\sslcert\\innercert.key", "outerConnectionCertPath": "c:\\sslcert\\outercert.crt", "outerPrivateKeyPath": "c:\\sslcert\\outercert.key" }
Procedure
On the SVP, start Windows command prompt as an Administrator.
Move the current directory to the directory where the tool exists
cd /d C:\Mapp\wk\Supervisor\MappIniSetNote- C:\Mapp indicates the installation directory of the storage management software and the SVP software. When the installation directory other than C:\Mapp was specified, replace C:\Mapp with the specified installation directory.
- If you specify --ignore-cert-verification, the signed certificate for SSL communication between the SVP and the management client is not verified when the certificate is updated. Specify this option immediately after you install HDvM - SN on the SVP or when the certificate has not been normally updated. (You must check the IP address of the GUM on the storage system beforehand.)
- If you specify --delete, the parameter file is automatically deleted after the SSL certificate is updated.
Run the following command:
mappsslcertupdate.bat --file=name-of-the-parameter-file-created-beforehand
A message appears indicating that the command finished, and then the GUM restarts automatically.
Restart the SVP manually.
Administering management software certificates
You can set or delete certificates for management software, including Hitachi Ops Center Administrator and Hitachi Command Suite, that are used to check the server's reliability when SSL communication external authentication is performed.
You cannot register the certificate for both Ops Center Administrator and HCS at the same time. Register one of the certificate for the server you are using to manage the storage system.
Registering management software certificates
Before you begin
- You must be logged into the SVP.
- The private key file on the management software server must be current. Update it if necessary.
- The certificate file must have a .crt extension. Rename the file if necessary.
- The certificate must be in X509 PEM format or X509 DER format.
Procedure
Close all Device Manager - Storage Navigator sessions on the SVP.
Open a command prompt window with administrator permissions.
Move the current directory to the folder containing the SVP configuration tool (for example, C:\MAPP\wk\Supervisor\MappIniSet), and then execute the following command:
MappHcsCrtEntry.bat absolute-path-of-signed-public-key-certificate-file
If you are using Hitachi Ops Center Administrator, execute the same command.
NoteA space is required between MappHcsCrtEntry.bat and the signed public key certification file path.When the completion message box appears, press any key to acknowledge the message and close the message box.
Close the command prompt window.
Deleting management software certificates
- Hitachi Ops Center Administrator
- Hitachi Command Suite (HCS)
After you delete a certificate, server reliability for that certificate is not checked by SSL communication for management software external authentication.
Before you begin
- You must be logged into the SVP.
- The private key file on the management software server must be current. Update it if necessary.
- The certificate file must have a .crt extension. Rename the file if necessary.
- The certificate must be in X509 PEM format or X509 DER format.
Procedure
Close all Device Manager - Storage Navigator sessions on the SVP.
Open a command prompt window with administrator permissions.
Move the current directory to the folder containing the SVP configuration tool (for example, C:\MAPP\wk\Supervisor\MappIniSet), and then execute the following command:
MappHcsCrtDelete.bat
Use this command for Ops Center Administrator and for HCS.
When the completion message box appears, press any key to acknowledge the message and close the message box.
Close the command prompt window.
Using HSTS
HSTS (HTTP Strict Transport Security) is a security mechanism used when the Web server communicates with the Web browser using HTTPS.
Enabling HSTS
Procedure
On the SVP, open a command prompt with administrator permissions.
Move the current directory to the folder containing the setting tool.
Execute the following command:
cd /d C:\Mapp\wk\Supervisor\MappIniSet MappHstsEnable.bat
NoteC:\Mapp:
indicates the installation directory of the storage management software and SVP software. If you specified a different installation directory, replaceC:\Mapp
with the specified installation directory.When prompted, press any key to continue.
To verify that HSTS is enabled, execute the following command:
MappHstsState.bat
- If "hsts=on" appears, HSTS is enabled. Press the Enter key, and then go to the next step.
- If "hsts=off" appears, HSTS is not enabled. Press the Enter key, and then go back to step 3.
- If a message indicating that the specified file could not be found appears, the HSTS settings failed. Press the Enter key, and then go back to step 3.
Close the command prompt window.
Disabling HSTS
To disable HSTS, use the following procedure:
Procedure
Open a command prompt with administrator permissions on the SVP.
Move the current directory to the folder in which the setting tool is located, and then execute the following command:
cd /d C:\Mapp\wk\Supervisor\MappIniSet MappHstsDisable.bat
NoteC:\Mapp:
indicates the installation directory of storage management software and SVP software. If you specified an installation directory other thanC:\Mapp
, replaceC:\Mapp
with the specified installation directory.When "Press any key to continue ..." appears in the window, press the Enter key.
To verify that HSTS is disabled, execute the following command:
MappHstsState.bat
NoteIf "hsts=off" appears, HSTS is disabled. Press the Enter key. If "hsts=on" appears, HSTS is not disabled. Press the Enter key, and then go back to step 2.
If the message indicating that the specified file could not be found appears, the HSTS settings failed. Press the Enter key, and then go back to step 2.
Close the command prompt window.