Converse agora com nosso suporte
Chat com o suporte

QoreStor 7.0.1 - User Guide

Introducing QoreStor Setting up your QoreStor system Configuring QoreStor settings Managing containers Managing local storage Managing cloud storage Managing replications Managing Users Monitoring the QoreStor system Support, maintenance, and troubleshooting [[[Missing Linked File System.LinkedTitle]]]

Managing Secure Connect with OST or RDA plug-in 4.1.0.265 or later

Unless manually disabled, Secure Connect is always running on the QoreStor server. Starting with QoreStor plug-in version 4.1.0.265, Secure Connect is enabled by default on the client machine. Review the sections below for the procedures to check Secure Connect status or disable and enable Secure Connect.

The commands below can be run both on the QoreStor server and the client machines. In both cases, the sc_manager command must be run from the directory that includes the sc.client.properties file. By default this is:

  • On the QoreStor server /opt/qorestor/bin

    NOTE: When configuring Secure Connect on the QoreStor server, the changes made are applicable only for container or optimized replication in which the QoreStor instance is a source.

  • For client machines, this is the plug-in installation directory. For example, for NetVault Backup:
    • Linux clients - /usr/local/ocarda
    • Windows clients - C:\Program Files\Quest\RDA\Dynlib

IMPORTANT: The procedures below use the sc_manager command which must be run by the root account.

Checking Secure Connect status

To check the status of Secure Connect

  1. Run the command sc_manager status according to one of the methods below:
    • Run sc_manager from the directory containing sc_client.properties.
      sc_manager status
    • Run sc_manager from any directory, using the path to the sc_client.properties.
      /opt/qorestor/bin/sc_manager status --property /opt/qorestor/bin/sc_client.properties
      SecureConnect.enabled = true
  2. The status of Secure Connect will be displayed:
    SecureConnect.enabled = true

Disabling Secure Connect

To disable Secure Connect

  1. Run the sc_manager disable command as described below:
    • Run sc_manager from the directory containing sc_client.properties.
      sc_manager disable
    • Run sc_manager from any directory, using the path to the sc_client.properties.
      /opt/qorestor/bin/sc_manager disable --property /opt/qorestor/bin/sc_client.properties
  2. The status of Secure Connect will be displayed as confirmation:
    SecureConnect.enabled = false
  3. After disabling Secure Connect, a service restart must be performed.
    • If you disabled Secure Connect on the QoreStor server, restart the QoreStor services using the commands:
    /opt/qorestor/bin/ctrlrpc -p 9901 node.stop
    /opt/qorestor/bin/ctrlrpc -p 9901 node.start
    • If you disabled Secure Connect on the client machine, services of the DMA application on that machine need to be restarted.

 

Enabling Secure Connect

To enable Secure Connect

  1. Run the sc_manager enable command as described below:
    • Run sc_manager from the directory containing sc_client.properties.
      sc_manager enable
    • Run sc_manager from any directory, using the path to the sc_client.properties.
      /opt/qorestor/bin/sc_manager enable --property /opt/qorestor/bin/sc_client.properties
  2. The status of Secure Connect will be displayed as confirmation:
    SecureConnect.enabled = true
  1. After enabling Secure Connect, a service restart must be performed.
    • If you enabled Secure Connect on the QoreStor server, restart the QoreStor services using the commands:
    /opt/qorestor/bin/ctrlrpc -p 9901 node.stop
    /opt/qorestor/bin/ctrlrpc -p 9901 node.start
    • If you enabled Secure Connect on the client machine, services of the DMA application on that machine need to be restarted.

Adding certificates for Secure Connect

The QoreStor Secure Connect feature requires custom certificates on both the client and QoreStor server machine.

NOTE: The certificates on both the client machine and QoreStor server must be from the same certificate authority.

Adding a Secure Connect certificate - Windows Client

  1. Prepare custom certificates chain and install them to the certificate store using the Microsoft Management Console (MMC) Certificates snap-in.
    1. Install the Root certificate to Trusted Root Certification Authorities.
    2. If necessary, install the Intermediate certificate to Intermediate Certification Authorities.
    3. Install the Server certificate to Personal.
  2. In the client installation directory, open the sc_client.properties file with a text editor.
  3. Edit the entries below:
    • openSSL.client.caConfig -  The path to the file of the trusted root certificate or directory containing the trusted root certificates chain. For specifying directory path, be sure that directory contains certificates in the PEM format and symbolic links to the certificate files, created by the c_rehash utility.
    • openSSL.client.certificateFile - The path to the file containing the server's or client's certificate in PEM format.
    • openSSL.client.privateKeyFile - The path to the file containing the private key for the certificate in PEM format.

      Example in case there is the chain of 3 certificates (root, intermediate, server), private key and they are located in the same directory as sc_client.dll:

      • openSSL.client.caConfig = ${application.configDir}
      • openSSL.client.certificateFile = ${application.configDir}server-certificate-name.pem
      • openSSL.client.privateKeyFile = ${application.configDir}privat-key-name.key

      Example in case there is the chain of 2 certificates (root, server), private key and they are located at C:\certificates:

      • openSSL.client.caConfig = C:\certificates\root-certificate-name.pem
      • openSSL.client.certificateFile = C:\certificates\server-certificate-name.pem
      • openSSL.client.privateKeyFile = C:\certificates\privat-key-name.key
  4. Make c_rehash for the certificates:
    1. Download perl from https://www.activestate.com/ActivePerl.
    2. Download the perl script c_rehash, stored inside OpenSSL (https://wiki.openssl.org/index.php/Binaries)
    3. Set the new openssl environment variable with the path to openssl.
    4. Run the command prompt.
    5. Use perl.exe with path_to_the_c_rehash and path_to_the_cert_dir arguments (e.g. perl.exe C:\<path to the c_rehash> C:\<path to the certificates directory>)
  5. When Secure Connect is used with any DMA - restart DMA services.

NOTE: If certificate validation fails, the connection between client and server will fail back to a normal connection.

Adding a Secure Connect certificate - Linux Client and QoreStor server

  1. Prepare custom certificates chain
  2. Place the certificate to be trusted (in PEM format) in /etc/pki/ca-trust/source/anchors/ and run sudo update-ca-trust at the prompt.

    If the certificate is in OpenSSL’s extended BEGIN TRUSTED CERTIFICATE format, place it in /etc/pki/ca-trust/source and run sudo update-ca-trust.

  3. Make c_rehash for the certificates:
    1. Install the openssl-perl package.
    2. Run c_rehash <path-to-the-folder-with-certificates>.
  4. In the client installation directory, open the sc_client.properties file with a text editor.
  5. Edit the entries below:
    1. openSSL.client.caConfig - The path to the file of the trusted root certificate or directory containing the trusted root certificates chain. For specifying directory path, be sure that directory contains certificates in the PEM format and symbolic links to the certificate files, created by the c_rehash utility.
    2. openSSL.client.certificateFile - The path to the file containing the server's or client's certificate in PEM format.
    3. openSSL.client.privateKeyFile - The path to the file containing the private key for the certificate in PEM format.

      Example in case there is the chain of 3 certificates (root, intermediate, server), private key and they are located in the same directory with sc_client.so, server side:

      • openSSL.server.caConfig = ${application.configDir}
      • openSSL.server.certificateFile = ${application.configDir}server-certificate-name.pem
      • openSSL.server.privateKeyFile = ${application.configDir}privat-key-name.key

      Example in case there is the chain of 2 certificates (root, server), private key and they are located at /usr/certificates on the client machine:

      • openSSL.client.caConfig = /usr/certificates/root-certificate-name.pem
      • openSSL.client.certificateFile = /usr/certificates/server-certificate-name.pem
      • openSSL.client.privateKeyFile = /usr/certificates/privat-key-name.key
  6. When Secure Connect is used with any DMA - restart DMA services.

NOTE: If certificate validation fails, the connection between client and server will fail back to a normal connection.

Enabling MultiConnect

Before using MultiConnect, ensure that the default port configuration is appropriate for your environment. The port used by MultiConnect is:

  • 11000 - This is the standard MultiConnect communication port for backup.
  • 9920 - This is the standard MultiConnect communication port for managed replication.

To enable Secure Connect on a Windows client

  1. On the client server, press Win+R to open the Run window.
  2. Type sysdm.cpl and click OK.
  3. Click the Advanced tab, then Environment Variables.
  4. In the System Variables section, click New.
  5. In the Variable name field, enter REMOTE_CLNT_MAX_CONNS.
  6. In the Variable value field, enter one of the following:
    • 4 - establishes 4 connections.
    • 8 - establishes 8 connections.
    • 16 - establishes 16 connections.
  7. Click OK, then OK.
  8. Restart the DMA services for the change to take effect.

To enable MultiConnect on a Linux client

  1. At the command prompt on the client machine, enter the following command
    echo 'export REMOTE_CLNT_MAX_CONNS=<4|8|16>' >> /etc/profile

    Where:

    • 4 - establishes 4 connections.
    • 8 - establishes 8 connections.
    • 16 - establishes 16 connections.
  2. Restart the DMA services for the change to take effect.

To enable MultiConnect between QoreStor servers

  1. At the command prompt on the source machine, enter the following command
    echo 'export REPL_CLNT_MAX_CONNS=16' >> /etc/oca/oca.cfg
  2. Restart the ocards service for the change to take effect.

Configuring and using Rapid NFS and Rapid CIFS

Rapid NFS and Rapid CIFS enable write operation acceleration on clients that use NFS and CIFS file system protocols. Similar to OST and RDS, these accelerators allow for better coordination and integration between QoreStor backup, restore, and optimized duplication operations with Data Management Applications (DMAs) such as CommVault, EMC Networker, and Tivoli Storage Manager. For the current list of supported DMAs, see the QoreStor Interoperability Guide.

Rapid NFS is a new client file system type that ensures that only unique data is written to QoreStor. It uses user space components and file system in user space (FUSE) to accomplish this. Metadata operations such as file creates and permission changes go through the standard NFS protocol, whereas write operations go through Rapid NFS.

Rapid CIFS is a Windows-certified filter driver that also ensures that only unique data is written to QoreStor. All chunking and hash computations are done at the client level.

NOTE: The supported DMAs listed in the QoreStor Interoperability Guide are the DMAs that have been tested and qualified with Rapid NFS and Rapid CIFS. You can use Rapid NFS and Rapid CIFS with other DMAs, but those products have not been tested and qualified with Rapid NFS or Rapid CIFS.

Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação