NETAPP存儲防火墻端口-典型NAS環(huán)境下的網(wǎng)絡需求_第1頁
NETAPP存儲防火墻端口-典型NAS環(huán)境下的網(wǎng)絡需求_第2頁
NETAPP存儲防火墻端口-典型NAS環(huán)境下的網(wǎng)絡需求_第3頁
NETAPP存儲防火墻端口-典型NAS環(huán)境下的網(wǎng)絡需求_第4頁
NETAPP存儲防火墻端口-典型NAS環(huán)境下的網(wǎng)絡需求_第5頁
已閱讀5頁,還剩11頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領

文檔簡介

1、-. z.網(wǎng)絡需求所有需要執(zhí)行SnapMirror數(shù)據(jù)復制的存儲之間,需翻開以下端口:協(xié)議UDP端口TCP端口SnapMirror1056510566NetApp FAS存儲支持通過網(wǎng)絡同步時鐘。如果存儲和NTP效勞器之間有防火墻,則翻開以下端口:協(xié)議UDP端口TCP端口NTP/SNTP123123TIME/RDATE3737所有被管理的存儲,必須通過IP網(wǎng)絡與DFM效勞器連通。如果存儲和DFM效勞器之間有防火墻,則翻開以下端口:協(xié)議UDP端口TCP端口 80 S443RSH514SSH22TELNET23SNMP161SNMP TRAP162如果有Windows機器需要管理例如,客戶端安裝了

2、OSSV備份軟件,則Windows機器需要通過IP網(wǎng)絡與DFM效勞器連通。如果Windows機器和DFM效勞器之間有防火墻,則翻開以下端口:協(xié)議UDP端口TCP端口 4092 S4093NDMP10000SNMP161SNMP TRAP162啟用DFM的autosupport功能,需要DFM效勞器和效勞器連通;并且效勞器需要一個不需密碼驗證的發(fā)送的賬號。如果效勞器和DFM效勞器之間有防火墻,則翻開以下端口:協(xié)議UDP端口TCP端口SMTP25附錄:DOT 7.2使用的IP端口IP port usage on a storage systemAbout this appendi*This app

3、endi* describes the Data ONTAP services file that is available in the /etc directory. The /etc/servicesfile is in the same format as its corresponding UNI* systems /etc/servicesfile. Although this file is it not used by Data ONTAP, it is provided in this appendi* as information useful to system admi

4、nistrators.Host identificationAlthough some port scanners are able to identify storage systems as storage systems, others port scanners report storage systems as unknown types, UNI* systems because of their NFS support, or Windows systems because of their CIFS support. There are several services tha

5、t are not currently listed in the /etc/services file. Below is an e*ample of a plete list of the file contents. ServicePort/ ProtocolDescriptionftp-data20/tcp# File transfer protocolftp21/tcp# File transfer protocolssh22/tcp# SecureAdmin rsh replacementtelnet23/tcp# Remote login (insecure)smtp25/tcp

6、# outbound connections for autosupporttime37/tcp# Time Servicetime37/udp# Time Servicedomain53/udp# DNS - outbound onlydomain53/tcp# DNS zone transfers - unuseddhcps67/udp# DHCP server - outbound onlydhcp68/udp# DHCP client - only first-time setuptftp69/udp# Trivial FTP - for netboot support 80/tcp#

7、 license, FilerView, SecureAdminkerberos88/udp# Kerberos 5 - outbound onlykerberos88/tcp# Kerberos 5 - outbound onlyportmap111/udp# aka rpcbind, used for NFSportmap111/tcp# aka rpcbind, used for NFSnntp119/tcp# unused, shouldnt be listed here.ntp123/tcp# Network Time Protocolntp123/udp# Network Time

8、 Protocolnetbios-name137/udp# NetBIOS nameserver - for CIFSnetbios-dg138/udp# NetBIOS datagram service - for CIFSftp-data139/tcp# NetBIOS service session - for CIFSssl443/tcp# Secure FilerView (SecureAdmin)cifs-tcp445/tcp# CIFS over TCP with NetBIOS framingsnmp161/udp# For Data Fabric Manager or oth

9、er such toolsshell514/tcp# rsh, insecure remote mand e*ecution.syslog514/udp# outbound onlyroute520/udp# for RIP routing protocolkerberos-sec750/udp# outbound only, if at allkerberos-sec750/tcp# outbound only, if at allnfsd2049/udp# primary NFS servicenfsd2049/tcp# primary NFS servicettcp5001/udp# u

10、nused, shouldnt be listed here.ttcp5001/tcp# unused, shouldnt be listed here.ndmp10000/tcp# for network backupssnapmirro10566/tcp# also SnapVaultndmp-local32243/tcp# Internal connection inside your storage system/etc/services NNTP and TTCP portsThe nntp and ttcp ports are unused by your storage syst

11、em and should never be detected by a port scanner.Ports found in a block starting around 600The following ports are found on the storage system with NFS enabled:UDP602NFS mount daemon (mountd) TCP603NFS mount daemon (mountd) UDP604NFS status daemon (statd, statmon) TCP605NFS status daemon (statd, st

12、atmon) UDP606NFS lock manager (lockd, nlockmgr) TCP607NFS lock manager (lockd, nlockmgr) UDP608NFS quota daemon (quotad, rquotad) On other systems, the ports appear as follows:UDP611NFS mount daemon (mountd) TCP612NFS mount daemon (mountd) UDP613NFS status daemon (statd, statmon) TCP614NFS status da

13、emon (statd, statmon) UDP615NFS lock manager (lockd, nlockmgr) TCP616NFS lock manager (lockd, nlockmgr) UDP617NFS quota daemon (quotad, rquotad) Enter the following mand on UNI* systems to obtain the correct information by querying the port mapper on port 111:program vers proto port service100011 1

14、udp 608 rquotad100021 4 tcp 607 nlockmgr100021 3 tcp 607 nlockmgr100021 1 tcp 607 nlockmgr100021 4 udp 606 nlockmgr100021 3 udp 606 nlockmgr100021 1 udp 606 nlockmgr100024 1 tcp 605 status100024 1 udp 604 status100005 3 tcp 603 mountd100005 2 tcp 603 mountd100005 1 tcp 603 mountd100005 3 udp 602 mou

15、ntd100005 2 udp 602 mountd100005 1 udp 602 mountd100003 3 udp 2049 nfs100003 2 udp 2049 nfs100000 2 tcp 111 rpcbind100000 2 udp 111 rpcbindNoteThe port numbers listed for mountd, statd, lockd, and quotad are not mitted port numbers. Storage systems can have these services running on other port numbe

16、rs. Because the system selects these port numbers at random when it boots, they are not listed in the /etc/services file.Other ports not listed in /etc/servicesThe following ports appear in a port scan but are not listed in /etc/services file.ProtocolPortServiceTCP22SSH (SecureAdmin)TCP443SSL (Secur

17、eAdmin)TCP3260iSCSI-TargetUDP*Legato ClientPack for your storage system runs on random UDP ports and is now deprecated. It is remended that NDMP be used to back up your storage system using Legato Networker.NoteDisable open ports that you do not need.FTPftp-dataftpFile transfer protocol (FTP) uses T

18、CP ports 20 and 21. For a detailed description of the FTP support for your storage system, see the Data ONTAP File Access and Protocols Management Guide. If you use FTP to transfer files to and from your storage system, the FTP port is required; otherwise, use FilerView or the following CLI mand to

19、disable the FTP port:options ftpd.enable offFTP is not a secure protocol for two reasons:When users log in to the system, user names and passwords are transmitted over the network in clear te*t format that can easily be read by a packet sniffer program. These user names and passwords can then be use

20、d to access data and other network resources. You should establish and enforce policies that prevent the use of the same passwords to access storage systems and other network resources.FTP server software used on platforms other than storage systems contains serious security-related flaws that allow

21、 unauthorized users to gain administrative (root) access and control over the host. SSHsshSecure Shell (SSH) protocol is a secure replacement for RSH and runs on TCP port 22. This only appears in a port scan if the SecureAdminTM software is installed on your storage system.There are three monly depl

22、oyed versions of the SSH protocol:SSH version 1-is much more secure than RSH or Telnet, but is vulnerable to TCP session attacks. This vulnerability to attack lies in the SSH protocol version 1 itself and not in the associated storage system products.SSH version 2-has a number of feature improvement

23、s over SSH version 1 and is less vulnerable to attacks. SSH version 1.5-is used to identify clients or servers that support both SSH versions 1 and 2. To disable SSH support or to close TCP port 22, use the following CLI mand:secureadmin disable sshTelnettelnetTelnet is used for administrative contr

24、ol of your storage system and uses TCP connections on port 23. Telnet is more secure than RSH, as secure as FTP, and less secure than SSH or Secure Socket Layer (SSL). Telnet is not secure because:When users log into a system, such as your storage system, user names and passwords are transmitted ove

25、r the network in clear te*t format. Clear te*t format can be read by an attacker using a packet sniffer program. The attacker can use these user names and passwords to log in to your storage system and e*ecute unauthorized administrative functions, including destruction of data on the system. If the

26、 administrators use the same passwords on your storage system as they do on other network devices, the attacker can use these passwords to access those resources as well.NoteTo reduce the potential for attack, establish and enforce policies preventing administrators from using the same passwords on

27、your storage system that they use for access to other network resources.Telnet server software used on other platforms (typically in UNI* environments) have serious security-related flaws that allow unauthorized users to gain administrative (root) control over the host. Telnet is also vulnerable to

28、the same type of TCP session attacks as SSH protocol version 1, but because a packet sniffing attack is easier, TCP session attacks are less mon.To disable Telnet, set options telnet.enable to off.SMTPsmtpThe Simple Mail Transport Protocol (SMTP) uses TCP port 25. Your storage system does not listen

29、 on this port but makes outgoing connections to mail servers using this protocol when sending AutoSupport .Time servicetimentpYour storage system supports two different time service protocols:TIME protocol (also known as rdate) is specified in the RFC 868 standard. This standard allows for time serv

30、ices to be provided on TCP or UDP port 37. Your storage system uses only UDP port 37. Simple network time protocol (NTP) is specified in the RFC 2030 standard and is provided only on UDP port 123. When your storage system has option timed.enable set to On and a remote protocol (rdate or ntp) is spec

31、ified, the storage system synchronizes to a network time server.If the timed.enable option is set to Off, your storage system is unable to synchronize with the network time server using NTP. The rdate time protocol can still be used by manually issuing the rdate mand from your storage system console

32、.You should set the timed.enable option to On in a cluster configuration.DNSdomainThe Domain Name Service (DNS) uses UDP port 53 and TCP port 53. Your storage system does not typically listen on these ports because it does not run a domain name server. However, if DNS is enabled on your storage syst

33、em, it makes outgoing connections using UDP port 53 for host name and IP address lookups. Your storage system never uses TCP port 53 because this port is used e*plicitly for munication between DNS servers. Outgoing DNS queries by your storage system are disabled by turning off DNS support. Turning o

34、ff DNS support protects against receiving bad information from another DNS server. Because your storage system does not run a domain name server, the name service must be provided by one of the following:Network information service (NIS) An/etc/hosts file Replacement of host names in the configurati

35、on files (such as /etc/e*ports, /etc/usermap.cfg, and so on) with IP addresses DNS must be enabled for participation in an Active Directory domain.DHCPdhcpsClients broadcast messages to the entire network on UDP port 67 and receive responses from the Dynamic Host Configuration Protocol (DHCP) server

36、 on UDP port 68. The same ports are used for the BOOTP protocol.DHCP is used only for the first-time setup of your storage system. Detection of DHCP activity on your storage system by a port scan other than the activity during the first-time setup indicates a serious configuration or software error.

37、TFTPtftpTrivial File Transfer Protocol (TFTP) uses TCP port 69. It is used mostly for booting UNI* or UNI*-like systems that do not have a local disk (this process is also known as netbooting) and for storing and retrieving configuration files for devices such as Cisco routers and switches.Transfers

38、 are not secure on TFTP because it does not require authentication for clients to connect and transfer files. Your storage systems TFTP server is not enabled by default. When TFTP is enabled, the administrator must specify a directory to be used by TFTP clients, and these clients cannot access other

39、 directories. Even within the TFTP directory, access is read-only. TFTP should be enabled only if necessary. Disable TFTP using the following option:options tftpd.enable offHyperte*t Transport Protocol ( ) runs on TCP port 80 and is the protocol used by web browsers to access web pages. Your storage

40、 system uses to access Files when the protocol is enabled FilerView for Graphical User Interface (GUI) administration Secure FilerView when SecureAdmin is installed The SecureAdmin SSL interface accepts connections on TCP port 443. SecureAdmin manages the details of the SSL network protocol, encrypt

41、s the connection, and then passes this traffic through to the normal FilerView interface through a loopback connection. This loopback connection does not use a physical network interface. munication takes place inside your storage system, and no clear te*t packets are transmitted.The protocol is not

42、 vulnerable to security attacks because it provides read-only access to documents by unauthenticated clients. Although authentication is not typically used for file access, it is frequently used for access to restricted documents or for administration purposes, such as FilerView administration. The

43、only authentication methods defined by the protocol send credentials, such as user names and passwords, over the network without encryption. The SecureAdmin product is provided with SSL support to overe this shorting.NoteIn versions of Data ONTAP earlier than 7.0, your storage system listens for new

44、 connections (by default, set to TCP port 80) even when the protocol is not licensed and FilerView is disabled. However, starting with Data ONTAP 7.0, you can stop your storage system from listening for new connections by setting the options d.enable and to Off. If either of the options is set to On

45、, your storage system will continue to listen for new connections. Kerberoskerberoskerberos-secThere are four Kerberos ports in the /etc/services file: TCP port 88, UDP port 88, TCP port 750, and UDP port 750. These ports are used only for outbound connections from your storage system. Your storage

46、system does not run Kerberos servers or services and does not listen on these ports.Kerberos is used by your storage system to municate with the Microsoft Active Directory servers for both CIFS authentication and, if configured, NFS authentication.NFSportmapnfsdThe Network File System (NFS) is used

47、by UNI* clients for file access. NFS uses port 2049. NFSv3 and NFSv2 use the portmapper service on TCP or UDP port 111. The portmapper service is consulted to get the port numbers for services used with NFSv3 or NFSv2 protocols such as mountd, statd, and nlm. NFSv4 does not require the portmapper se

48、rvice.NFSv4 provides the delegation feature that enables your storage system to grant local file access to clients. To delegate, your storage system sets up a separate connection to the client and sends callbacks on it. To municate with the client, your storage system uses one of the reserved ports

49、(port numbers less than 1024). To initiate the connection, the client registers the callback program on a random port and informs the server about it.With delegations enabled, NFSv4 is not firewall friendly because several other ports need to be opened up as well.You can disable the TCP and UDP port

50、s by setting the and options to Off.To disable NFS, use the nfs off mand. CIFSnetbios-namenetbios-dgnetbios-ssncifs-tcpThe mon Internet File Service (CIFS) is the successor to the server message block (SMB) protocol. CIFS is the primary protocol used by Windows systems for file sharing.CIFS uses UDP

51、 ports 137 and 138, and TCP ports 139 and 445. Your storage system sends and receives data on these ports while providing CIFS service. If it is a member of an Active Directory domain, your storage system also must make outbound connections destined for DNS and Kerberos.CIFS is required for Windows

52、file service. You can disable CIFS using FilerView or by issuing the cifs terminate mand on your storage system console.NoteIf you disable CIFS, be aware that your storage systems /etc/rc file can be set up to automatically enable CIFS again after a reboot.SSLsslThe Secure Sockets Layer (SSL) protoc

53、ol provides encryption and authentication of TCP connections.When SecureAdmin is installed and configured on your storage system, it listens for SSL connections on TCP port 443. It receives secure web browser connections on this port and uses unencrypted through a loopback connection to pass the tra

54、ffic to FilerView, running on TCP port 80. This loopback connection is contained within your storage system and no unencrypted data is transmitted over the network.TCP port 443 can be disabled using FilerView or with the following mand:secureadmin disable sslSNMPsnmpSimple Network Management Protoco

55、l (SNMP) is an industry-standard protocol used for remote monitoring and management of network devices over UDP port 161.SNMP is not secure becauseInstead of using encryption keys or a user name and password pair, SNMP uses a munity string for authentication. The munity string is transmitted in clea

56、r te*t format over the network, making it easy to capture with a packet sniffer. Within the industry, devices are typically configured at the factory to use public as the default munity string. The public password allows users to make queries and read values but does not allow users to invoke mands

57、or change values. Some devices are configured at the factory to use private as the default munity string, allowing users full read-write access. Even if you change the read and write munity string on a device to something other than private, an attacker can easily learn the new string by using the r

58、ead-only public munity string and asking the router for the read-write string. There are three versions of SNMP: SNMPv1 is the original protocol and is not monly used. SNMPv2 is identical to SNMPv1 from a network protocol standpoint and is vulnerable to the same security problems. The only differenc

59、es between the two versions are in the messages sent, messages received, and the type of information that is available. These differences are not important from a security point of view. This version of SNMP is currently used on your storage systems. SNMPv3 is the latest protocol version and include

60、s security improvements but is difficult to implement and many vendors do not yet support it. SNMPv3 supports several different types of network encryption and authentication schemes. It allows for multiple users, each with different permissions, and solves SNMPv1 security problems while maintaining

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論