GDE Installation & Configuration Guide v4.0.0.4
GDE Installation & Configuration Guide v4.0.0.4
Document Version 2
10/21/2020
GDE Appliance
Installation and Configuration Guide
Release 4.0.0.4
Installation and Configuration Guide
4.0.0.4
Document Version 2
10/21/2020
All information herein is either public information or is the property of and owned solely by Thales DIS France S.A. and/or its subsidiaries
or affiliates who shall have and keep the sole right to file patent applications or any other kind of intellectual property protection in
connection with such information.
Nothing herein shall be construed as implying or granting to you any rights, by license, grant or otherwise, under any intellectual and/or
industrial property rights of or concerning any of Thales DIS France S.A. and any of its subsidiaries and affiliates (collectively referred to
herein after as “Thales”) information.
This document can be used for informational, non-commercial, internal and personal use only provided that:
l The copyright notice below, the confidentiality and proprietary legend and this full warning notice appear in all copies.
l This document shall not be posted on any network computer or broadcast in any media and no modification of any part of this
document shall be made.
Use for any other purpose is expressly prohibited and may result in severe civil and criminal liabilities.
The information contained in this document is provided "AS IS" without any warranty of any kind. Unless otherwise expressly agreed in
writing, Thales makes no warranty as to the value or accuracy of information contained herein.
The document could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein.
Furthermore, Thales reserves the right to make any change or improvement in the specifications data, information, and the like described
herein, at any time.
Thales hereby disclaims all warranties and conditions with regard to the information contained herein, including all implied
warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Thales be liable,
whether in contract, tort or otherwise, for any indirect, special or consequential damages or any damages whatsoever including
but not limited to damages resulting from loss of use, data, profits, revenues, or customers, arising out of or in connection with the
use or performance of information contained in this document.
Thales does not and shall not warrant that this product will be resistant to all possible attacks and shall not incur, and disclaims,
any liability in this respect. Even if each product is compliant with current security standards in force on the date of their design,
security mechanisms' resistance necessarily evolves according to the state of the art in security and notably under the
emergence of new attacks. Under no circumstances, shall Thales be held liable for any third party actions and in particular in case
of any successful attack against systems or equipment incorporating Thales products. Thales disclaims any liability with respect
to security for direct, indirect, incidental or consequential damages that result from any use of its products. It is further stressed
that independent testing and verification by the person using the product is particularly encouraged, especially in any application
in which defective, incorrect or insecure functioning could result in damage to persons or property, denial of service or loss of
privacy.
Copyright 2009 - 2020 Thales Group. All rights reserved. Thales and the Thales logo are trademarks and service marks of Thales and/or
its subsidiaries and affiliates and are registered in certain countries. All other trademarks and service marks, whether registered or not in
specific countries, are the properties of their respective owners.
IBM® Guardium Data Encryption
Release 4.0.0.4
IBM Guardium Data Encryption 4.0.0.4 is the same product as Vormetric Data Security (VDS) Release 6.4.3. VDS
Release 6 consists of Data Security Manager and Vormetric Agents.
Preface v
Documentation Version History v
Assumptions v
Document Conventions v
Typographical Conventions vi
Notes, tips, cautions, and warnings vi
Hardware-Related Warnings vii
Sales and Support vii
Appendix A: Ports 27
Ports to Configure 27
Appendix B: Troubleshooting 29
Loss of Connection 29
Is the Management Console accessible? 29
Check whether Agent communication ports are open from the UI 29
GDE v3.0 v1 09/22/2017 The GDE 3.0a release is the same as DSM release v6.0.1. This release
introduces the following new features: Bonded NICs, a new concise
initialization method that reduces the load on the appliance and the network
when the agents are re-initialized, and re-signing of host settings.
Enhancements have been made to Availability.
GDE 3.0b v1 12/14/2017 GDE 3.0b release is the same as DSM release v6.0.2-patch. This release
addresses several security issues.
GDE 3.0.0.2 v1 09/07/2018 GA release of GDE 3.0.0.2. The GDE 3.0.0.2 release is the same as DSM
release v6.1.0. Virtual appliances can now be HMS-enabled by connecting
them to an nShield Connect appliance.
GDE 4.0.0.0 4/11/2019 GA release; HA is now active/active, new CLI commands, new API calls . This
guide contains new troubleshooting information. Added rules for hostnames.
GDE 4.0.0.1 09/13/19 Supports Efficient Storage with VTE 6.2.0, Excluding files from encryption,
fixed security vulnerabilities.
GDE 4.0.0.2 12/19/2019 GDE Appliance now compatible with Smart cards, users can create
GuardPoints for Cloud Object Storage devices, System admins can prevent
domain admins from deleting other admins, LDAP limits raised.
GDE 4.0.0.3 v1 5/22/2020 GDE Appliance is now compatible with IDT GuardPoints, SecureStart now
works with ESG devices.
GDE 4.0.0.4 v1 10/16/2020 Various GUI improvements. You can now integrate with multiple LDAP
forests. Web Certificate supports using SAN.
Assumptions
This documentation assumes that you have knowledge of your computer network as well as network configuration
concepts.
For more information about what’s new in this release, refer to the Release Notes. Refer to the GDE Administrators
Guide for how to administer your GDE Appliance and to the various agent guides for information about Vormetric Data
Security Agents.
Document Conventions
The document conventions describe common typographical conventions and important notice and warning formats
used in Thales technical publications.
Typographical Conventions
This section lists the common typographical conventions for Thales technical publications.
bold regular font GUI labels and options. Click the System tab and select General Preferences.
italic regular font GUI dialog box titles The General Preferences window opens.
Note
It is recommended to keep tokenization keys separate from the other encryption/decryption keys.
A tip is used to highlight information that helps you complete a task more efficiently, such as a best practice or an
alternate method of performing the task.
Tip
You can also use Ctrl+C to copy and Ctrl+P to paste.
Caution statements are used to alert you to important information that may help prevent unexpected results or data
loss. For example:
CAUTION
Make a note of this passphrase. If you lose it, the card will be unusable.
A warning statement alerts you to situations that can be potentially hazardous to you or cause damage to hardware,
firmware, software, or data. For example:
WARNING
Do not delete keys without first backing them up. All data that has been encrypted with
deleted keys cannot be restored or accessed once the keys are gone.
Hardware-Related Warnings
The following warning statement is used to indicate the risk of electrostatic discharge of equipment:
ELECTROSTATIC DISCHARGE
If this warning label is affixed to any part of the equipment, it indicates the risk of
electrostatic damage to the module. To prevent equipment damage, follow suitable
grounding techniques.
The following warning statement is used to indicate the risk of hazardous voltages of equipment:
HAZARDOUS VOLTAGES
The warnings in this section indicate voltages that could cause serious danger to
personnel.
Overview 1
Register on the Thales Support Site in order to download the OVA file 1
Extract the GDE appliance license 2
Installing the GDE Appliance 2
Configure the appliance 7
Overview
The the IBM GDE virtual appliance helps you protect structured and unstructured data and meet compliance
requirements. It provides centralized encryption key and policy management to simplify data security management.
In conjunction with the GDE appliance, VTE/VAE/VTS/VPTD agents enable data-at-rest encryption and the collection
of security intelligence logs without re-engineering applications or infrastructure.
6. Click on the “Vormetric Data Security Manager 6.4.3.17026 Downloads” link to go to the Download page.
7. In the table, click on the OVA link in the Virtual DSM - OVA section.
Note: When you are performing an upgrade, download the file in the Upgrade Package field. See
"Upgrade to GDE 4.0.0.4" on page 17 for more information on upgrading to the latest version.
8. Once you are on the KB page, click the download link to the right of: Click here to download file.
3. For Windows, run the enabler file (GDE_4_0_0_4.exe) website by double-clicking it.
4. Select a language to display the instructions and the EULA, by entering a number that corresponds to that
language.
5. Accept the default location to install the license, or follow the on-screen instructions to save it to another location.
Press ENTER to continue.
6. Accept the license agreement.
7. The license is saved on your system in the default location or to the one you specified.
Note: Make sure you can access the system on which you have saved the license from the GDE
appliance. You will need to upload this license file to start using the appliance.
8. Import the license to your GDE Appliance. You can do this by logging in to the GDE Web UI, navigating to
System > License, and clicking Upload License File.
Note: This is also the license that you will use to enable CCKM (CipherTrust Cloud Key Manager)
System Requirements
l VMware ESXi v6.0 or later with v9 hardware or later
l VMware vSphere Client
Hardware Requirements
The hardware hosting the virtual machine must meet the following requirements:
Number of Agents
1 to 10 11 to 50 Over 250
Number of CPUs 2 4 4 6
Installation Plan
1. Assemble configuration information using the checklist, see "GDE Appliance Installation Checklist" below
2. Complete the pre-configuration tasks.
3. Deploy the GDE appliance as described here, see "Deploying the GDE Appliance" on page 6.
4. Setup initial and basic configurations as described here, "Configure the appliance" on page 7
5. Verify Web access as described here, "Verify web access" on page 11.
REQUIREMENT VALUE
Software requirements
4GB memory
Network Information
Certificate Information
o Both forward and reverse address resolution is required for nodes in a cluster.
o FQDN name must be lowercase
l If you do NOT use a DNS server to resolve host names, do the following on all of the GDE Appliances and the
protected hosts:
o Modify the host file on the GDE Appliance: To use names like serverx.domain.com, enter the host names and
matching IP addresses in the /etc/hosts file on the GDE Appliance using the host command under the
network menu. For example:
0011:network$ host add <hostname> 192.168.1.1
SUCCESS: add host
0012:network$ host show
name=localhost1.localdomain1 ip=::1
name=<host name>.<domain name>.com ip=192.168.10.8
name=<host name> ip=192.168.1.1
SUCCESS: show host
You must do one of the following on each GDE Appliance, since entries in the host file are not replicated
across GDE Appliances.
o Modify the host file on the protected hosts: Enter the GDE Appliance host names and matching IP addresses
in the /etc/hosts file on the protected host.
Note
You must do this on EACH protected host making sure to add an entry for all GDE Appliance nodes (if
using HA).
o Use IP addresses: You may use IP addresses or the FQDN to identify the host simultaneously. In other
words, they don't all have to use an IP address or FQDN.
Port configuration
If a GDE appliance must communicate with a device behind a firewall, you must open various ports in the firewall.
The port table lists the communication direction and purpose of each port you must open. See "Ports to Configure" on
page 27.
To enter a submenu, enter a name or just the first few letters of the name. To display the commands for that submenu,
enter a ?. For example, the submenu maintenance is used to provide maintenance utilities:
0001:dsm$ main
0038:maintenance$ ?
showver Show the installed VTS version
ntpdate Set ntp services
date Set system date
time Set system time
Every command has usage and example input. Type the command without a value:
0039:maintenance$ ntpdate
usage: ntpdate {sync | add SERVER_ADDRESS | delete SERVER_ADDRESS | on | off | show }
0040:maintenance$ date
month=Mar day=17 year=2015
Show system date SUCCESS
0041:maintenance$ time
hour=11 min=11 sec=36 zone=PDT
Show system time SUCCESS
0042:maintenance$ gmttimezone
usage: gmttimezone {list|show|set ZONE_NAME}
0043:maintenance$ diag
usage: diag [log [ list | view LOG_FILE_NAME] | vmstat | diskusage | hardware | osversion |
uptime ]
0044:maintenance$
You must enter the submenu to execute the submenu commands. For example, the reboot command is in the system
submenu, so you would enter system, then enter reboot. To return to the main level when finished, enter up.
A complete description of the CLI commands can be found in the Administrators Guide.
10. At the message Completed Successfully, click Close. The main screen of the vSphere Client appears.
11. In the left pane, select the Virtual Appliance you just created and then click the power on icon in the tool bar. It
takes about a half hour to provision the VM and build the appliance.
12. To watch the output as the installation progresses, click the Console tab and click inside the console window.
When the installation is finished, continue to the next section.
2. The Thales EULA is displayed, type ‘y’ to accept and press Enter.
3. When prompted, type in a new password and press Enter. Reconfirm your password.
4. Do not lose this password.
5. Navigate to the network commands menu. Type:
0000:dsm$ network
Note
We recommend that you retain the default eth1 IP address configuration in the event that you need a
recovery option to access the GDE appliance.
0001:network$ ip address init <IP address>/<subnet mask (e.g. 16 or 24)> dev
eth0/eth1
ip address init 192.168.10.2/16 dev eth1
IPv6 Example: ip address init fa01::3:15:130/64 dev eth1
Note
If you are connected via eth0 and you choose to configure eth0 with a new IP address, you will be
disconnected at this step. Reconnect on the new IP address.
7. (Optional) You may choose to configure the eth0 interface instead of retaining the default IP address
192.168.10.1, if for example, you want the GDE appliance to communicate with agents on a different subnet, or
access the Management Console from a different subnet. To configure an IP address for eth0, type:
0001:network$ ip address init <eth0 IP address>/<subnet mask (e.g., 16 or 24)> dev eth0
ip address init 192.168.10.3/16 dev eth0
IPv 6 Example: ip address init fa01::3:15:130/64 dev eth0
The following warning is displayed:
WARNING: Changing the network ip address requires server software to be restarted.
Continue? (yes|no) [no]:
Type ‘yes’ to continue with the IP address configuration.
11. If you are using DNS, set the initial DNS server for the GDE appliance. Type:
dns dns1 <ip address for dns server 1>
12. If you have a second or third DNS server, set them for the GDE appliance. Type:
dns dns2 <ip address for dns server 2>
1. Access the GDE appliance CLI and login with your login credentials. If this is the first time you are logging in,
then you will be required to accept the license agreement and change the default password.
2. Navigate to the network commands menu;
0000:dsm$ network
0001:network$
6. To disable or break up a bonded NIC type, you can use either the delete or flush command. Delete will only delete
a specific IP address (multiple can be assigned) and flush will clear all assigned IP addresses.
0003:network$ ip address delete <ip_address>/<subnet_mask> dev bond0
0003:network$ ip address flush bond0
Routes that are associated with this bonded NIC device will also be deleted.
7. Set the country and city where the GDE appliance resides. Type:
0005:maintenance$ gmttimezone set <country/city>
8. Set the date. (If you used ntpdate synch, this step is not necessary.) Type:
0006:maintenance$ date <mm/dd/yyyy>
9. Set the time. (If you used ntpdate synch, this step is not necessary.) Type:
0007:maintenance$ time <hh:mm:ss>
Where hh is 00 to 23.
10. Verify your settings. Type:
0008:maintenance$ time
0009:maintenance$ date
5. Example:
0003:system$ setinfo hostname securityserver.company.com
2. A warning is displayed, informing you that all agents and peer node certificates will need to be re-signed after the
CA and server certificate have been regenerated, and the GDE appliance server software will be restarted. Type
‘yes’ to continue, the default is ‘no’.
3. Enter the FQDN of this appliance, the name displayed in ‘This Security Server host name [FQDN of the GDE
appliance]’, should be correct if you entered the host name information in the previous sections correctly. Press
Enter to accept the name.
4. Next, enter the information required to generate the certificate. Answer the prompts:
a. What is the name of your organizational unit? []:
b. What is the name of your organization? []:
c. What is the name of your City or Locality? []:
d. What is the name of your State or Province? []:
e. What is your two-letter country code? [US]:
f. What is the validity period of the generated certificate (from 2 to 10 years)? [10]:
5. Once the certificate is signed, return to the main menu. Type:
If the URL doesn't work because, for example, port 443 is blocked by a firewall, specify port 8448 or 8445.
Example:
https://securityserver.vormetric.com:8448
https://securityserver.vormetric.com:8445
If the link still does not work, make sure all the necessary ports are open, see "IPMI Ports" on page 1
The first time you connect to the appliance via a web browser, a self-signed certificate is used by default. Your
browser will display a warning about the SSL certificate, follow the instructions on your browser to continue with the
default self-signed certificate. You can configure the GDE appliance to use third party signed certificates after you
have logged in for the first time. Refer to the GDE Administrators Guide, chapter 6 for procedures to do this.
The default user name and password to log on to the GDE appliance the for first time are; admin and admin123. You
will be prompted to reset the password. The password criteria are:
l Does not have repeating characters
l Uses at least 1 upper and 1 lower case character
l Uses at least 1 special character
Upgrade Paths 13
Migrating to a GDE 3.0 Appliance 13
Upgrade to the DSM patch 6.1.0.9229 16
Upgrade to GDE 4.0.0.4 17
Upgrade Paths
The following table describes the GDE upgrade path based on your current version:
l The change from DSM patch 6.1.0.9229 to GDE v4.0.0.3 involves a database migration. That migration is built
into 6.1.0.9229, which is why all users must upgrade to 6.1.0.9229 first, and then upgrade from 6.1.0.9229 to
GDE v4.0.0.3.
l The change from v4.0.0.3 to v4.0.0.4 involves a BDR upgrade. This requires all users to upgrade to GDE v4.0.0.3
first, and from there, upgrade to GDE v4.0.0.4
Note
If you are upgrading from a version higher than GDE 3.0, you can upgrade directly to the DSM patch
6.1.0.9229. Prior to upgrading, follow the steps below to backup your current configuration, in case the
upgrade fails to upgrade your system properly.
Note
Some Browsers will automatically save and download the file. Some will display a Save as dialog.
6. Click Save in the File Download dialog box, if your browser displays one.
7. Save the file to a secure location that you are sure will still be accessible if the server fails.
By default, the file name will be in the format: backup_config_<gde server name>_yyyy_mm_dd_hhmm.tar (.zip
for Windows). Where <gde_server name> is the FQDN of the GDE appliance that is being backed up.
8. Return to the System > Wrapper Keys menu option and select Operation > Export to export key shares.
9. Set a number for both the Minimum Custodians Needed and the Total Number of Custodians.
This setting splits the wrapper key value among multiple custodians. If only a single administrator is to control the
wrapper key, enter a value of 1 in both fields.
10. Select the GDE appliance administrators who will serve as custodians for the wrapper key shares.
Administrators of type System Administrator and All are listed. You can select any of these administrators, with
the exception of the default initial log‐
on administrator admin, as a custodian.
11. Click Apply on the bottom right hand corner.
If you have selected more than one custodian, each of them is given a share of the wrapper key. The wrapper key
share is displayed on their Dashboard page, beneath the fingerprint for the CA, when they log into the
Management Console. The generated wrapper key, or key shares, are exported and are visible on the
Dashboard, beneath the fingerprint for the CA. The Wrapper Key Share displayed on the Dashboard is a toggle.
Click Show to display the wrapper key share value. Each administrator must see a unique wrapper key share
displayed on the dashboard beneath the fingerprint for the CA.
12. On the Dashboard, click Wrapper Key Share string to hide the value and display ‘Show’.
13. Ensure the administrator(s) or wrapper key custodian(s) securely store a copy of this key or key share. This is
required, as part of their role in a GDE appliance restore operation.
Note
Do NOT lose the wrapper key used to create the backup. You cannot restore the backup without the
wrapper key that was used to create it.
14. Create a backup of the GDE appliance configuration after the wrapper key has been created.
Create a backup
1. Log on to the Management Console as a System/All Administrator.
2. Select the System > Backup and Restore menu option. The Manual Backup and Restore page opens.
3. Click Backup tab and then click Ok.
4. Click Save in the File Download dialog box. Save the file to a secure location that you are sure will still be
accessible if the server fails. By default, the file name will be in the format:
backup_config_<gde server name>_yyyy_mm_dd_hhmm.tar (.zip)
Where <gde server name> is the FQDN of the GDE appliance that is being backed up.
5. Save the backup to a secure location. Access to the backup should be limited to only a few employees and
should be audited.
Note
If you are using a third party SSL certificate, then a change in the GDE appliance hostname will cause a
cause a conflict when you restore the backup.
You will have to upload a new third party certificate with the new GDE appliance hostname.
After you configure the new GDE 3.0 appliance with the same hostname and IP address, you must take the old
appliance off of the network, otherwise any registered agents will try and communicate with both the old and the new
GDE appliance and cause conflicts in your system.
If you configure a GDE 3.0 appliance and give it a new hostname, then when you reach your destination version of the
GDE software, VTE agents that were registered with the earlier GDE appliance backup will have to re-register with the
new GDE appliance. Refer to the VTE Agent Installation and Configuration Guide for detailed procedures to re-register
agents.
For procedures to install and configure a GDE appliance, see "Installing the GDE Appliance" on page 2.
Note
If you already have the Wrapper Key imported, skip to Step 8.
3. Import wrapper keys. Select System > Wrapper Keys from the menu bar.
4. Select Import from the Operation dropdown menu. Click Add.
5. If key shares have created from the wrapper key, paste a Key Share value from one previously stored with a
custodian into the Key Share text field and click Ok.
6. Repeat steps 5 and 6 for each administrator selected as a key custodian if you have chosen to have more than
one custodian for the wrapper key. A key share must be imported for at least as many as were specified by the
Minimum Number of Custodians value when the wrapper key was exported.
7. Click Apply to finish importing the wrapper key.
8. Restore the backup file. Select System > Backup and Restore from the menu bar.
9. Select the Restore tab.
10. Click Browse. Locate and select the backup file to restore.
11. Click Ok. The restored file uploads and the GDE appliance disconnects from the Management Console. The
restore operation takes up to 30 minutes to complete.
If the browser has not refreshed automatically after the restore operation, you must manually refresh the browser
to log back on to the Management Console.
If you were using a third party SSL certificate, this certificate will now also be restored as part of this operation.
See "Verify web access" on page 11 for more details.
12. Log back on to the Management Console as an administrator of type System or All. Verify that the configuration
is restored correctly
Upload a license
As part of the process of configuring a new GDE 3.0 appliance, you will have already uploaded the GDE 3.0 license.
However, once you restore a backup of the earlier GDE version, you will need to upload the license once again. Click
System > License > Upload the license file.
HA Overview
To configure High Availability (HA) for GDE Appliances, you need to be a System/All administrator and have GDE
Appliances CLI privileges. A GDE Appliances HA configuration consists of two or more GDE Appliances HA nodes.
As of GDE Appliances v6.2.0, HA is now configured as Active-Active. This means that there is no longer a primary or
a failover node. All nodes are peers. When one node fails, the other nodes continue operating normally. When the
failed node is working properly again, it synchronizes with the other HA nodes. that if you are migrating from 6.1.x or an
earlier version, then you can't upgrade or migrate. You have to create a new cluster.
Note
If you are migrating from an HA cluster that is GDE Appliances v6.1.x or an earlier version, then you
cannot upgrade or migrate your cluster to 6.2.x or 6.3.x. You must create a new cluster. See "Migrating
from DSM v6.1.0.9229 to DSM 4.0.0.4" on page 1 for more information.
Supported HA Deployments
You must have at least two GDE Appliance HA nodes installed on the same network to create an HA cluster. The
maximum number of nodes allowed in an HA cluster is eight.
To ensure reliable operation, the appliances in an HA cluster must run the same version of the GDE Appliances
software and have the same hardware configurations.
Prerequisites
Before you set up your HA cluster, do the following:
1. Specify a hostname resolution method.
You can map a host name to an IP address using a Domain Name Server (DNS). DNS is the preferred method of
host name resolution.
You can modify the hosts file on the HA node:
a. Log in to the CLI menu.
b. Type: network
c. Type: host add <hostname> <IP address>
Note
For upgrades and fresh installations of GDE Appliances 6.2.0, if you are using HA, you must open port
5432 in your firewall to allow communication between GDE Appliances HA nodes. For Azure and AWS
platforms, you will need to add this port to your security groups. You can now close port 50000 as it is no
longer used.
3. Perform a ‘ping’ operation on all of the GDE Appliances to ensure that network communication is working
between the GDE Appliances HA nodes.
Network Latency
If the network latency between the HA nodes exceeds 100ms, you may experience delays in HA replication,
especially if you have many policies, or you have large policies that contain many resource sets, user sets, etc.
Another factor in network latency is the Policy Version History setting (System > General Preferences > System >
Policy (Maximum Number of Saved Policy History). Each time changes are made to a policy, a new version of that
policy is created. This setting determines how many previous versions of the policy to keep. The more versions that
are kept, the longer the delay because it increases the time required to replicate policy data to the cluster nodes. We
recommend changing this value to 0 or 5 from the default of 10 if you experience network latency.
Note
The license must be installed on the GDE Appliance designated as HA node 1 before you can configure
the other HA nodes.
2. On HA node 1 (the Initial Server), log on to the Management Console as an administrator of type System, or All.
3. Click High Availability in the menu bar. The High Availability Servers window opens.
4. Click Add. The Add High Availability Server window opens.
5. In the Server Name field, enter the host name or FQDN of a GDE Appliance node.
6. Click Ok. The GDE Appliance node is listed in the High Availability Servers window. It is designated as ‘Not
Configured’.
Note
You can also add nodes in the CLI. See the High Availability Category section in the CLI chapter in the
GDE Appliance Admin guide.
Note
Sometimes, when GDE Appliances nodes are spread far apart geographically, or are in a cloud
environment, the Join function takes so long that the ssh session times out and terminates automatically
before the Join can finish. If the Join function fails, type: join longwait to make the join command proceed
in a 'longwait mode' (as opposed to the 'normalwait' mode). The difference between the two modes is the
duration that it waits for the node replication status state to be set to 'ready.' Longwait waits for
approximately twice as long as the normalwait mode.
This node may have multiple IP addresses. All the agents will have to connect to the
Security Server using the same IP.
Enter the host name of this node. This will be used by Agents to talk to this Security
Server.
This Security Server host name[dsm15100.i.vormetric.com]:
Please enter the following information for key and certificate generation.
5. The HA cluster will issue the certificate using the information you provide in the following steps:
e. What is the name of your organization? []:
f. What is the name of your City or Locality? []:
a. What is the name of your organizational unit? []:
b. What is the name of your State or Province? []:
c. What is your two-letter country code? [US]:
d. What is your email address? []:
e. What is the validity period of the generated certificate (from 2 to 10 years)? [10]:
System Response:
WARNING: The following information you entered will be used to join this server to the
HA cluster, please make sure the information is correct
Initial Security Server host name:HaNode1.i.vormetric.com
Initial Security Server system administrator name:voradmin
Initial Security Server system administrator password:xxxxxxxx
This Security Server host name[dsm15100.i.vormetric.com]:HaNode2.i.vormetric.com
The name of your organizational unit: TP
The name of your organization: Thales
The name of your City or Locality: SJ
The name of your State or Province: CA
Your two-letter country code[US]: US
What is your email address: groot@thales.com
Restore original host assignment back to this node (yes|no)[yes]:
Continue? (yes|no)[no]: yes
10. In the GUI, click the High Availability tab. In the row for the HA node 2, the Synchronization status should
contain a green circle and the Configured column should contain a check.
5. Select and click OK for nodes that you want to move to your current node. The GDE Appliance moves the
selected Agent host from the previous HA node to the current HA node.
Note
You can assign both unassigned hosts and hosts currently assigned to other nodes. GDE Appliances will
move those nodes from the previous node to the current node.
6. Once the original HA node is up and running, you can reassign the VTE Agent(s) back to the original node, if
desired.
Upgrading an HA Cluster
When upgrading the nodes in an HA cluster, you must break the cluster by removing a node from the cluster, running
the HA cleanup function and then upgrading that node independently.
Note
If you are migrating from an HA cluster that is DSM v6.1.x or an earlier version, then you cannot upgrade or
migrate your cluster to 6.2.x or 6.3.x. You must create a new cluster.
Note
Do not reassign hosts in the HA cluster that are already registered to a node. The host assignment is
preserved. When a node is removed from the cluster and then joined back into it, the host(s) are
reassigned to the same node.
Prerequisite
l Backup your current GDE Appliances configuration, as described above, "Backup current DSM configuration" on
page 1.
Note
If synchronization is in progress anywhere in the HA cluster, wait until it completes before upgrading each
of the nodes in the cluster.
3. Repeat the previous step for all of the nodes in the HA cluster.
4. After removing the nodes, log on to one of the other nodes, (not the initial one) as CLI Admin and switch to the HA
menu.
0001:dsm$ ha
SUCCESS: cleanup
7. Repeat the cleanup process for every node that you removed from the HA cluster.
6. To disable the communication between the nodes and stop synchronizations to the node, in the HA menu, type:
0001:ha$ cleanup
Example
0001:ha$ remove dsm15099.i.vormetric.com reassignhost dsm15100.i.vormetric.com
To make the GDE Appliances move the hosts to HA nodes and evenly distribute the load, type:
0001:ha$ remove <node1> reassignhost rr
Example
0001:ha$ remove dsm15099.i.vormetric.com reassignhost rr
System Response
WARNING: This command removes the given server node from the HA cluster. After deletion, running
the "ha cleanup" command from its CLI will be required.
This may take several minutes.
Continue? (yes|no)[no]:yes
SUCCESS: Removed server node from the HA cluster.
WARNING
Remember to ALWAYS run cleanup on the node that was removed from the HA cluster.
Note
After deletion, make sure that you log on to the deleted node through the CLI menu and run HA >
Cleanup.
Ports to Configure
The following table lists the communication direction and purpose of each port you must open.
Communication
Port Protocol Purpose
Direction
GDE Appliance
443 TCP Browser Redirects to either port 8445 or 8448 depending on the security mode. (8445 is
GDE Appliance used in compatible & RSA modes; 8448 is used in Suite B mode, for secure
GDE Appliance communication between GDE Appliances in an HA cluster and for LDT
registration.)
GDE Appliance
Agent
GDE Appliance
GDE Appliance
(HA node n)
5696 TCP KMIP client Allows communication between the KMIP client and GDE Appliances
GDE Appliance
7025 TCP/UDP GDE Appliance Uses SNMP to get HA node response time.
GDE Appliance
8080 TCP Agent Port 8080 is no longer used for registration, but you can manually close/open this
GDE Appliance legacy port for new deployment, for backward compatibility if you use previous
GDE Appliance versions of the agent and need to register to 8080. Default is on (open).
Syntax
GDE Appliance 0001:system$ security legacyregistration
[ on | off | show ]
Communication
Port Protocol Purpose
Direction
8443 TCP Agent RSA TCP/IP port through which the agent communicates with the GDE Appliance,
GDE Appliance in case 8446 is blocked. The agent establishes a secure connection to the
GDE Appliance, through certificate exchange, using this port.
8444 TCP Agent RSA port via which the Agent log messages are uploaded to GDE Appliance, in
GDE Appliance case 8447 is blocked.
8445 TCP Browser Management Console, VMSSC, and fall back for HA communication in case port
GDE Appliance 8448 is dropped.
GDE Appliance
GDE Appliance
(fall back)
8446 TCP Agent Configuration Exchange using Elliptic Curve Cryptography (Suite B)
GDE Appliance
8447 TCP Agent Agent uploads log messages to GDE Appliance using Elliptic Curve Cryptography
GDE Appliance (ECC) and RSA
8448 TCP Browse GUI Management during enhanced security using Elliptic Curve Cryptography
GDE Appliance (Suite B). Also for secure communication between GDE Appliances in an HA
GDE Appliance cluster. Also used for communication between host with LDT host and
GDE Appliance during Agent registration.
GDE Appliance
Agent
GDE Appliance
8449 TCP Smart Card Smart card used with RSA mode
GDE Appliance
8450 TCP Smart Card Smart card used with ECC/compatible mode
GDE Appliance
9005 TCP GDE Appliance Used by Remote Administration Service process to accept connections from the
remote Remote Administration Client.
admin
Loss of Connection
If you have created GuardPoints and for some reason the appliance cannot be reached, the GuardPoints will continue
to function with no issues. However, if the system is rebooted, the agent cannot access its configuration from the
appliance and the GuardPoints cannot use the encryption key to encrypt or decrypt data, unless you are using a
cached-on-host key. Challenge and response and manual passwords are good way to provide business continuity in
these situations.