Security Handbook
Security Handbook
       User Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
                 Types of User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
       Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
                 Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
                 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
                 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
                 Secure SHell (SSH) and Secure CoPy (SCP) for the Command Line Interface 7
                 Transport Layer Security (TLS) for the Web interface . . . . . . . .7
                 Creating and Installing Digital Certificates . . . . . . . . . . . . . . . . .8
                 Choosing a Method for your System . . . . . . . . . . . . . . . . . . . . . .9
                 Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
Security Handbook                                                                                                      i
Using the ssl command in the Command Line Interface .20
      Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
RADIUS ...........................................................................26
      Supported RADIUS Functions and Servers. . . . . . . . . . . . . . . . . . . . . 26
               Supported functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          26
               Supported RADIUS Servers . . . . . . . . . . . . . . . . . . . . . . . . . .                 26
               Configure the Management Card or Device . . . . . . . . . . . . . .                          26
               RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   26
               Configure the RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . .                27
               Example using Service-Type Attributes . . . . . . . . . . . . . . . . .                      27
               Examples using Vendor Specific Attributes . . . . . . . . . . . . . . .                      27
               RADIUS Users file with VSAs . . . . . . . . . . . . . . . . . . . . . . . . .                28
               Example with UNIX shadow passwords . . . . . . . . . . . . . . . . .                         29
ii                                                                                                                Security Handbook
       Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
                Description of Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
                Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
       Device Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
                Software Patch Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
                Privileged Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
                Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
                Use of Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
                Minimum Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
                SSH Host Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
                Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
                No Unattended Console Sessions . . . . . . . . . . . . . . . . . . . . . .33
                No Unnecessary Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
       Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
                Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
                Background and Description of Risk . . . . . . . . . . . . . . . . . . . . .33
                Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
                Network Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
                Other Security Detection and Monitoring Tools . . . . . . . . . . . .34
     User Management
     Types of User Accounts
          The Network Management Card has five basic levels of access:
              • A Super User: can use all of the management menus available in the Web interface and all of the
                commands in the command line interface.
              • Administrative User: can use all of the management menus available in the Web interface and all of
                the commands in the command line interface.
              • A Device User: can access the event log and data log (but cannot delete the contents of either log),
                and can use the device-related menus and commands.
              • Network-Only User: can only access network-related information.
              • A Read-Only User: can access the event log, data log, and device-related menus, but cannot
                change configurations, control devices, delete data, delete the content of logs, or use file transfer
                options.
          Note: Some APC devices have additional user accounts, e.g., outlet users for Switched Rack PDUs and
          an A/C Manager for some NetworkAIR devices. For information on the additional account type, see the
          User’s Guide provided with the device.
          Note: A Super User is an Administrator account which is persistent and cannot be deleted but can still be
          enabled or disabled.
Security Handbook                                                                                                   1
        Note: The Administrative, Device, Network-Only, and Read-Only user accounts are disabled by default,
        and cannot be enabled until a password is set for each user account.
    Security
    Security Features
2                                                                                                  Security Handbook
           SNMPv1 and SNMPv3
             Security Access                Description
             Available methods              For both SNMPv1 and SNMPv3, the host name restricts
             (SNMPv1)*:                     access to the Network Management System (NMS) at that
             • Community Name               location only, and the NMS IP filters allow access only to the
             • Host Name
                                            NMSs specified by one of the IP address formats in the
             • NMS IP filters
             • Agents that can be           following examples:
               enabled or disabled                     • 159.215.12.1: Only the NMS at the IP address
             • Four access                                159.215.12.1.
               communities
                                                       • 159.215.12.255: Any NMS on the 159.215.12
             • with read/write/disable
               capability                                segment.
                                                       • 159.215.255.255: Any NMS on the 159.215
             Available methods
             (SNMPv3):                                   segment.
             • Four User Profiles                      • 159.255.255.255: Any NMS on the 159 segment.
             • Authentication through
             an authentication                         • 0.0.0.0 or 255.255.255.255: Any NMS.
             passphrase                                • SNMPv3 has additional security features that
             • Encryption through a                      include the following:
             privacy passphrase
             • SHA or MD5                                  – An authentication passphrase to ensure that
             authentication                                  an NMS trying to access the Management
             • AES or DES encryption                         Card or device is the NMS it claims to be.
             algorithm                                     – Encryption of data during transmission, with a
             • NMS IP filters                                privacy passphrase required for encrypting
                                                             and decrypting.
Security Handbook                                                                                              3
    Web Server
     Security Access              Description
    RADIUS
     Security Access              Description
    Wi-Fi
     Security Access              Description
4                                                                                           Security Handbook
          Change default user names and passwords immediately
          After installation and initial configuration of the Management Card or network-enabled device,
          immediately change the user names and passwords from their defaults to unique user names and
          passwords to establish basic security. You are required to change the default Super User password at first
          log in as a security measure.
          Note: You cannot change the user name of the Super User. It is recommended that the Super User
          account is disabled, once any additional Administrator accounts are created.
          Port assignments
          If the Telnet, FTP, SSH/SCP, or the Web server uses a non-standard port, a user must specify the port in
          the command line or Web address used to access the Management Card or device. A non-standard port
          number provides an additional level of security. The ports are initially set at the standard “well known
          ports” for the protocols. To increase security, change the ports to any unused port numbers from 5001 to
          32768 for the FTP server and from 5000 to 32768 for the other protocols and servers. (The FTP server
          uses both the specified port and the port one number lower than the specified port.)
          User names, passwords, and community names with SNMPv1
          All user names, passwords, and community names for SNMPv1 are transferred over the network as plain
          text. A user who is capable of monitoring the network traffic can determine the user names and passwords
          required to log on to the accounts of the command line interface or Web interface of the Management
          Card or network-enabled device. If your network requires the higher security of the encryption-based
          options available for the command line interface and Web interface, disable SNMPv1 access or set its
          access to Read. (Read access allows you to receive status information and use SNMPv1 traps.)
          To disable SNMPv1 access on the Configuration tab, select Network on the top menu bar and select
          Access under the SNMPv1 heading. Clear the Enable SNMPv1 access check box and click Apply.
          To set SNMPv1 access to Read, perform the following steps: On the Configuration tab select Network.
          Select SNMPv1 and then Access Control. For each configured Network Management System (NMS),
          click the community names and set the Access Type to Read. Select Apply.
          Note: SNMPv1 is disabled by default and the Community Names are blank.
          Wi-Fi Security
          Wi-Fi support is available in firmware version v1.4.x and higher with the optional APC USB Wi-Fi Device
          (AP9834). Enabling wi-fi will disable the wired LAN connection. The NMC will reboot when the wi-fi
          settings are configured. After the reboot, the wired connection will be disabled and the NMC will attempt to
          connect to the given Network Name (SSID).
          To enable wi-fi, a Security Type must be selected: WPA, WPA2-AES, WPA2-Mixed, WPA2-TKIP, or
          WPA2-Enterprise. If you have an enterprise network with RADIUS, it is highly recommended that you
          choose WPA2-Enterprise as this is the most secure option. If you do not have an enterprise network, it is
          recommended you select WPA2-AES which uses a pre-shared password. However, AES may not be
          supported on older access points.
          If your access point does not support AES, it is recommended you choose WPA2-Mixed which will use
          AES, TKIP, or WPA depending on what is supported. Selecting WPA2-TKIP will use TKIP for encryption,
          which is deprecated and not recommended. WPA is the oldest and least secure option and also not
          recommended.
          For information on how to configure wi-fi, refer to the APC USB Wi-Fi Device Quick Start Guide, NMC 3
          User Guide, and NMC 3 CLI Guide.
          For a list of supported TLS ciphers and key exchanges of the Wi-Fi Device, see Knowledge Base article
          FA416486.
Security Handbook                                                                                                   5
    Authentication
        You can choose security features for the Management Card or network-enabled device that control
        access by providing basic authentication through network port access, user names, passwords, and IP
        addresses, without using encryption. These basic security features are sufficient for most environments in
        which sensitive data are not being transferred.
        As an added layer of security, network-based port access via EAPoL can also be utilized to request
        network access at the individual port level via the network’s switch or router (where applicable) which the
        Management Card is connected.
6                                                                                               Security Handbook
     Encryption
Secure SHell (SSH) and Secure CoPy (SCP) for the Command Line Interface
          Secure CoPy
          SCP is a secure file transfer application that you can use instead of FTP. SCP uses the SSH protocol as
          the underlying transport protocol for encryption of user names, passwords, and files.
              • When you enable and configure SSH, you automatically enable and configure SCP. No further
                configuration of SCP is needed.
              • You must explicitly disable FTP. It is not disabled by enabling SSH. To disable FTP, on the
                Configuration tab, select Network and then FTP Server. Clear the Enable check box and click
                Apply. Note: Telnet is disabled, and SSH is enabled by default.
Security Handbook                                                                                                7
        Note: The Management Card automatically negotiates to use the highest supported protocol or cipher
        suite that is supported by the Management Card and the client. Use the client-side settings to enable/
        disable certain protocols or cipher suites. Alternatively, the various cipher suites/algorithms the
        Management Card supports can be configured via the CLI interface. The Minimum Protocol field can also
        be configured to be used to force the minimal protocol (TLS 1.1 or TLS 1.2 to use when negotiating a
        connection.
        Note: When TLS is enabled, your browser displays a small lock icon.
        TLS uses a digital certificate to enable the browser to authenticate the server (in this case, the
        Management Card or device). The browser verifies the following:
            • The format of the server certificate is correct.
            • The expiration date and time of the server certificate have not passed.
            • The DNS name or IP address specified when a user logs on matches the Common Name (or
              Subject Alt Name) in the server certificate.
            • The server certificate is signed by a trusted certifying authority Each major browser manufacturer
              distributes CA root certificates of the commercial Certificate Authorities in the certificate store
              (cache) of its browser so that it can compare the signature on the server certificate to the signature
              on a CA root certificate.
        You can use the NMC Security Wizard CLI utility to create a certificate signing request to an external
        Certificate Authority, or if you do not want to use an existing Certificate Authority, you can create an APC
        root certificate to upload to the certificate store (cache) of the browser. You can also use the utility to
        create a server certificate to upload to the Management Card or device.
        Note: See Creating and Installing Digital Certificates for a summary of how these certificates are used. To
        create certificates and certificate requests, see Create a Root Certificate and Server Certificates and
        Create a Server Certificate and Signing Request.
        SSL/TLS also uses various algorithms and encryption ciphers to authenticate the server, encrypt data,
        and ensure the integrity of the data, i.e., that it has not been intercepted and sent by another server.
        Note: Web pages that you have recently accessed are saved in the cache of your Web browser and allow
        you to return to those pages without re-entering your user name and password. Always close your
        browser session before you leave your computer unattended.
        Purpose
        For network communication that requires a higher level of security than password encryption, the Web
        interface of the Management Card or network-enabled device supports the use of digital certificates with
        the Transport Layer Security (TLS) protocol. Digital certificates can authenticate the Management Card or
        device (the server) to the Web browser (the TLS client).
        Note: In firmware version 1.4.x and higher, you can generate ECDSA keys. It is highly recommended you
        generate ECDSA keys over RSA keys as they provide a higher level of security.
        The sections that follow summarize the three methods of creating, implementing, and using digital
        certificates to help you determine the most appropriate method for your system.
            • Method 1: Use the default certificate auto-generated by the Network Management Card or network-
              enabled device (ECDSA P-256-bit).
              Note: AOS 1.1.0.16 and higher use a SHA-2 signature algorithm.
            • Method 2: Use the NMC Security Wizard CLI utility to create a CA certificate and a server
              certificate.
            • Method 3: Use the NMC Security Wizard CLI utility to create a certificate-signing request to be
              signed by the root certificate of an external Certificate Authority and to create a server certificate.
              Note: You can also use Method 3 if your company or agency operates its own Certificate Authority.
8                                                                                                 Security Handbook
                    Use the NMC Security Wizard CLI utility in the same way, but use your own Certificate Authority in
                    place of a commercial Certificate Authority.
              • Method 4: Use the ssh and ssl commands in the CLI. See Using the ssl command in the
                Command Line Interface for more information.
          Disadvantages:
              • This method does not include the authentication provided by a CA certificate (a certificate signed
                by a Certificate Authority) that Methods 2 and 3 provide. There is no CA Certificate cached in the
                browser. Therefore, when you log on to the Management Card or device, the browser generates a
                security alert, indicating that a certificate signed by a trusted authority is not available, and asks if
                you want to proceed. To avoid this message, you must install the default server certificate into the
                certificate store (cache) of the browser of each user who needs access to the Management Card or
                device, and each user must always use the fully qualified domain name of the server when logging
                on to the Management Card or device.
              • The default server certificate has the serial number of the Management Card or device in place of a
                valid Common Name or Subject Alt Name (the DNS name or the IP address of the Management
                Card or device). Therefore, although the Management Card or device can control access to its
                Web interface by user name, password, and account type (e.g., Super User, Administrator,
                Device-Only User, or Read-Only User), the browser cannot authenticate which Management
                Card or device is sending or receiving data. Note: The Common Name will be the hostname of the
                NMC after it completes its reset operation.
          Method 2: Use the NMC Security Wizard CLI utility to create a CA certificate and a server
          certificate
          Use the NMC Security Wizard CLI utility to create two digital certificates:
              • CA root certificate (Certificate Authority root certificate) that the NMC Security Wizard CLI utility
                uses to sign all server certificates and which you then install into the certificate store (cache) of the
                browser of each user who needs access to the Management Card or device.
              • A server certificate that you upload to the Management Card or device. When the NMC Security
                Wizard CLI utility creates a server certificate, it uses the CA root certificate to sign the server
                certificate.
Security Handbook                                                                                                       9
     The Web browser authenticates the Management Card or device sending or requesting data:
         • To identify the Management Card or device, the browser uses the Common Name or Subject Alt
           Name (IP address or DNS name of the Management Card or device) that was specified in the
           server certificate’s distinguished name when the certificate was created.
         • To confirm that the server certificate is signed by a “trusted” signing authority, the browser
           compares the signature of the server certificate with the signature in the root certificate cached in
           the browser. An expiration date confirms whether the server certificate is current.
     Method 2 has the following advantages and disadvantages.
     Advantages
     Before they are transmitted, the user name and password and all data to and from the Management Card
     or device are encrypted.
         • You choose the length of the public key (RSA key) that is used for encryption when setting up a
           TLS session (use 2048-bit to provide complex encryption and a high level of security).
         • The server certificate that you upload to the Management Card or device enables TLS to
           authenticate that data is being received from and sent to the correct Management Card or device.
           This provides an extra level of security beyond the encryption of the user name, password, and
           transmitted data.
         • The root certificate that you install to the browser enables the browser to authenticate the server
           certificate of the Management Card or device to provide additional protection from unauthorized
           access.
     Disadvantage
     Because the certificates do not have the digital signature of a commercial Certificate Authority, you must
     load a root certificate individually into the certificate store (cache) of each user’s browser. (Browser
     manufacturers already provide root certificates for commercial Certificate Authorities in the certificate
     store within the browser, as described in Method 3.)
10                                                                                            Security Handbook
          Method 3: Use the NMC Security Wizard CLI utility to create a certificate-signing request
          to be signed by the root certificate of an external Certificate Authority and to create a
          server certificate.
          Use the NMC Security Wizard CLI utility to create a request (a .csr file) to send to a Certificate Authority.
          The Certificate Authority returns a signed certificate (a .crt file or .cer file typically) based on information
          you submitted in your request. You then use the NMC Security Wizard CLI utility to create a server
          certificate (a .p15 file) that includes the signature from the root certificate returned by the Certificate
          Authority. Upload the server certificate to the Management Card or device.
          Note: You can also use Method 3 if your company or agency operates its own Certificate Authority. Use
          the NMC Security Wizard CLI utility in the same way, but use your own Certificate Authority in place of a
          commercial Certificate Authority.
          Method 3 has the following advantages and disadvantages.
          Advantages
          Before they are transmitted, the user name and password and all data to and from the Management Card
          or device are encrypted.
              • You have the benefit of authentication by a Certificate Authority that already has a signed root
                certificate in the certificate cache of the browser. (The CA certificates of commercial Certificate
                Authorities are distributed as part of the browser software, and a Certificate Authority of your own
                company or agency has probably already loaded its CA certificate to the browser store of each
                user’s browser.) Therefore, you do not have to upload a root certificate to the browser of each user
                who needs access to the Management Card or device.
              • You choose the length of the public key (RSA key) that is used for setting up a TLS session (use
                2048-bit to provide complex encryption and a high level of security).
              • The server certificate that you upload to the Management Card or device enables TLS to
                authenticate that data are being received from and sent to the correct Management Card or device.
                This provides an extra level of security beyond the encryption of the user name, password, and
                transmitted data.
              • The browser matches the digital signature on the server certificate that you uploaded to the
                Management Card or device with the signature on the CA root certificate that is already in the
                browser’s certificate cache to provide additional protection from unauthorized access.
          Disadvantages
          Setup requires the extra step of requesting a signed root certificate from a Certificate Authority.
              • An external Certificate Authority may charge a fee for providing signed certificates.
Security Handbook                                                                                                      11
     Firewalls
         Although some methods of authentication provide a higher level of security than others, complete
         protection from security breaches is almost impossible to achieve. Well-configured firewalls are an
         essential element in an overall security scheme.
         Logs: The Active Firewall Policy Log lists the most recent firewall events, including the protocol, traffic,
         action, and rule priority, in reverse chronological order.
         Note: This log is not persistent and can hold up to 50 events.
         Configuration: Enable or disable the overall firewall functionality.
         Active Policy: Select an active policy from the available firewall policies.
         Active Rules: Lists the individual rules that are being enforced based on the current active policy. Note:
         This option is only available when the firewall is enabled.
         Create/Edit Policy: Create a new policy or edit an existing one.
         Load Policy: Load a policy file (.fwl suffix) from a source external to this device.
         Test Policy: Temporarily enforce the rules of a chosen policy.
12                                                                                                  Security Handbook
     Using the NMC Security Wizard CLI Utility
     Overview
          The NMC Security Wizard CLI utility creates components needed for high security for a Management
          Card or network-enabled device on the network when you are using Transport Layer Security (TLS) and
          related protocols and encryption routines.
          Note: The NMC Security Wizard CLI utility can create security components for Management Cards or
          devices running firmware 1.1.0.16 or higher.
Security Handbook                                                                                                      13
     Files you Create for TLS and SSH Security
         Use the NMC Security Wizard CLI to create these components of a TLS and SSH security system:
             • The server certificate for the Management Card or network-enabled device, if you want the benefits
               of authentication that such a certificate provides. You can create either of the following types of
               server certificate:
                   a. A server certificate signed by a custom CA root certificate also created with the NMC
                      Security Wizard CLI. Use this method if your company or agency does not have its own
                      Certificate Authority and you do not want to use an external Certificate Authority to sign the
                      server certificate.
                   b. A server certificate signed by an external Certificate Authority. This Certificate Authority can
                      be one that is managed by your own company or agency or can be one of the commercial
                      Certificate Authorities whose CA root certificates are distributed as part of a browser’s
                      software.
             • A certificate signing request containing all the information required for a server certificate except
               the digital signature. You need this request if you are using an external Certificate Authority.
             • A CA root certificate
             • An SSH host key that your SSH client program uses to authenticate the Management Card or
               device when you log on to the command line interface.
         Note: You define whether the public keys for TLS certificates and the host keys for SSH that are created
         with the NMC Security Wizard CLI are 2048-bit RSA keys (the default setting), or 1024-bit RSA keys,
         which provide complex encryption and a higher level of security.
         Note: NMC Security Wizard CLI uses the SHA-2 signature algorithm.
         Note: If you do not create and use TLS server certificates and SSH host keys with the NMC Security
         Wizard CLI, the Management Card or device generates 2048-bit RSA keys using the SHA-2 signature
         algorithm.
         Only APC server management and key management products can use server certificates, host keys, and
         CA root certificates created by the NMC Security Wizard CLI. These files will not work with products such
         as OpenSSL® and Microsoft® Internet Information Services (IIS).
14                                                                                                 Security Handbook
          Create a CA root certificate that will sign all server certificates to be used with Management Cards or
          devices. During this task, two files are created:
              • The file with the .p15 suffix is an encrypted file that contains the Certificate Authority’s private key
                and public root certificate. This file signs server certificates.
              • The file with the .crt suffix contains only the Certificate Authority’s public root certificate. Load this
                file into each Web browser that will be used to access the Management Card or device so that the
                browser can validate the server certificate of that Management Card or device.
              • Create a server certificate, which is stored in a file with a .p15 suffix. During this task, you are
                prompted for the CA root certificate that signs the server certificate.
              • Load the server certificate onto the Management Card or device.
              • For each Management Card or device that requires a server certificate, repeat the tasks that create
                and load the server certificate.
Security Handbook                                                                                                        15
     Load the CA Root Certificate to your Browser
         Load the .crt file to the browser of each user who needs to access the management card or device.
         Note: See the help system of the browser for information on how to load the .crt file into the browser’s
         certificate store (cache). Following is a summary of the procedure for Microsoft Internet Explorer.
             1. Select Tools, then Internet Options from the menu bar.
             2. In the dialog box, on the Content tab click Certificates and then Import.
             3. The Certificate Import Wizard guides you through the rest of the procedure. The file type to select
                is X.509, and the CA Public Root Certificate is the .crt file created in the procedure Create a Root
                Certificate and Server Certificates.
     Create an SSL/TLS Server Certificate
             1. Open a command prompt and navigate to the folder containing the extracted NMC Security
                Wizard CLI files.
             2. Issue the below command and complete the fields to create the SSL Server Certificate:
                NMCSecurityWizardCLI --sslcert -o <file> -r <file> -n <common_name> -c
                <country> [-m <state_province> -l <locality> -g <organization> -u <orga-
                nizational_unit> -e <email> -f <validity_from> -t <validity_to> -i
                <uri_name> -d <dns_name> -a <ip_address>]
                Note: Enter a name for this file using the -o flag, which will contain the SSL server certificate and
                corresponding browser certificate. The file must not contain a suffix/file extension and, by default,
                will be created in the current folder with the .p15 and .crt extensions respectively.
                Note: Enter the name for the CA Public Root Certificate using the -r flag. The value must not
                contain the suffix/file extension of the actual file.
                Note: You can use the -k flag to specify the length of the key to generate (use 1024 bits or 2048
                bits, which is the default setting, to provide complex encryption and a high level of security).
                Note: When you provide the information to configure the CA root certificate, the Country and
                Common Name fields are the only required fields. For the Common Name field, enter an identify-
                ing name of your company or agency. Use only alphanumeric characters, with no spaces.
                Note: By default, a CA root certificate is valid for 4 years from the current date, but you can edit the
                Validity Period Start and Validity Period End fields.
                Note: Because the configuration information is part of the signature, the information for every cer-
                tificate must be unique. The configuration of a server certificate cannot be the same as the config-
                uration of the CA root certificate. (The expiration date is not considered part of the unique
                configuration. Some other configuration information must also differ.
             3. The output will then display the certificate issuer and certificate subject information. If any
                information is incorrect, rerun the command with the correct values.
     Load the Server Certificate to the Management Card or Device
             1. Select: Configuration > Network > Web > SSL Certificate tab
             2. Select Add or Replace Certificate File, and browse to the server certificate, the .p15 file you
                created in the procedure Create a Root Certificate and Server Certificates.
         Note: You can use FTP or Secure CoPy (SCP) instead to transfer the server certificate. An example
         command for SCP to transfer a certificate named cert.p15 to a Management Card or device with an IP
         address of 156.205.6.185 would be: scp cert.p15 apc@156.205.6.185:ssl/cert.p15. Then, import the
         server certificate using the ssl command in the CLI. For example: ssl key -i ssl/cert.p15. For
         more information, see the CLI Guide.
         Note: SCP utilities may have different command syntax.
16                                                                                                  Security Handbook
     Create a Server Certificate and Signing Request
     Summary
          Use this procedure if your company or agency has its own Certificate Authority or if you plan to use a
          commercial Certificate Authority to sign your server certificates.
              • Create a Certificate Signing Request (CSR). The CSR contains all the information for a server
                certificate except the digital signature. This process creates two output files:
                      a. The file with the .p15 suffix contains the private key of the Management Card or device.
                      b. The file with the .csr suffix contains the certificate signing request, which you send to an
                         external Certificate Authority.
              • When you receive the signed certificate from the Certificate Authority, import that certificate.
                Importing the certificate combines the .p15 file containing the private key and the file containing the
                signed certificate from the external Certificate Authority. The output file is a new encrypted server
                certificate file with a .p15 suffix.
              • Load the server certificate onto the Management Card or device.
              • For each Management Card or device that requires a server certificate, repeat the tasks that create
                and load the server certificate.
                    Note: Enter a name for this file using the -o flag, which will contain the certificate signing request
                    and corresponding private key. The file must not contain a suffix/file extension and, by default, will
                    be created in the current folder with the .csr and .p15 extensions respectively.
                    Note: You can use the -k flag to specify the length of the key to generate (use 1024 bits or 2048
                    bits, which is the default setting, to provide complex encryption and a high level of security).
                    Note: When you provide the information to configure the CA root certificate, the Country and
                    Common Name fields are the only required fields. For the Common Name field, enter an identify-
                    ing name of your company or agency. Use only alphanumeric characters, with no spaces.
                    Note: By default, a CA root certificate is valid for 4 years from the current date, but you can edit the
                    Validity Period Start and Validity Period End fields.
              4. Send the certificate signing request to an external Certificate Authority, either a commercial
                 Certificate Authority or, if applicable, a Certificate Authority managed by your own company or
                 agency.
          Note: See the instructions provided by the Certificate Authority regarding the signing and issuing of server
          certificates.
Security Handbook                                                                                                        17
     Import the Signed Certificate
         When the external Certificate Authority returns the signed certificate, import the certificate. This procedure
         combines the signed certificate and the private key into an SSL/TLS server certificate that you then
         upload to the Management Card or device.
             1. Open a command prompt and navigate to the folder containing the extracted NMC Security
                Wizard CLI files
             2. Issue the below command and complete the fields to create the SSL/TLS Server Certificate:
                NMCSecurityWizardCLI --import -o <file> -s <file> -p <file>
                Note: Enter a name for this file using the -o flag, which will contain the SSL/TLS server certificate.
                The file must not contain a suffix/file extension and, by default, will be created in the current folder
                with the .p15 extension.
                Note: Enter a name for this file using the -s flag, which contains the signed server certificate. The
                file must contain a suffix/file extension of .cer or .crt.
                Note: Enter a name for this file using the -p flag, which contains the private key. The file must not
                contain a suffix/file extension, but locally will have the .p15 extension.
             3. The output will then display the Issuer Information on the summary screen which confirms that the
                external Certificate Authority signed the certificate.
     Load the Server Certificate to the Management Card or Device
             1. Select: Configuration > Network > Web > SSL Certificate
             2. Select Add or Replace Certificate File, and browse to the server certificate, the .p15 file you
                created in the procedure Create a Root Certificate and Server Certificates.
         Note: You can use FTP or Secure CoPy (SCP) instead to transfer the server certificate. An example
         command for SCP to transfer a certificate named cert.p15 to a Management Card or device with an IP
         address of 156.205.6.185 would be: scp cert.p15 apc@156.205.6.185:ssl/cert.p15. Then, import the
         server certificate using the ssl command in the CLI. For example: ssl key -i ssl/cert.p15. For
         more information, see the CLI Guide.
         Note: SCP utilities may have different command syntax.
18                                                                                                  Security Handbook
                    Note: Enter a name for this file using the -o flag, which will contain the SSH server host key. The
                    file must not contain a suffix/file extension and, by default, will be created in the current folder with
                    the .p15 extension.
                    Note: You can use the -k flag to specify the length of the key to generate (use 1024 bits or 2048
                    bits, which is the default setting, to provide complex encryption and a high level of security).
     Load the Host Key to the Management Card or Device
              1. Select: Configuration > Network > Console > SSH Host Key
              2. Select Add or Replace Host Key, and browse to the host key, the .p15 file you created in the
                 procedure Create the host key.
              3. At the bottom of the User Host Key page, note the SSH fingerprint. Log on to the Management
                 Card or device through your SSH client program and verify that the correct host key was uploaded
                 by verifying that these fingerprints match the fingerprints that the client program displays.
          Note: Alternatively, you can use FTP or Secure CoPy (SCP) to transfer the host key file to the
          Management Card or device. An example command for SCP to transfer a host key named hostkey.p15
          to a Management Card or device with an IP address of 156.205.6.185 would be: scp hostkey.p15
          apc@156.205.6.185:ssh/hostkey.p15. Then, import the server certificate using the ssh command in the
          CLI. For example: ssh key -i ssh/cert.p15. For more information, see the CLI Guide.
          Note: SCP utilities may have different command syntax.
Security Handbook                                                                                                         19
     Using the ssl command in the Command
     Line Interface
     Overview
         The topic details how to use the ssl command in the Command Line Interface (CLI) to configure the
         NMC’s Web UI (HTTPS) certificate. It can be used as an alternative to the NMC Security Wizard CLI
         utility.
         Note: The ssl command is available in firmware version 1.4 and higher.
20                                                                                            Security Handbook
              2. Create a certificate signed by a Certificate Authority (CA). How a CA creates a certificate from a
                 CSR is beyond the scope of this example. There are many examples online on how to use
                 Certificate Authorities to sign certificates, including how to create your own CA.
                    – The Certificate Authority (CA) creates a signed certificate (nmc.crt) from the CSR (nmc.csr).
              3. Upload and import the signed certificate. Note: The NMC certificate to be imported must match
                 the NMC key used to create the NMC CSR in step 1.
                      a. Upload the NMC certificate using Secure Copy:
                         scp nmc.crt apc@192.168.1.204:ssl/nmc.crt
                      b. Import the certificate:
                         ssh apc@192.168.1.204 ssl cert -i ssl/nmc.crt
          The NMC HTTPS certificate configuration is complete and the NMC HTTPS interface is available for
          immediate use.
Security Handbook                                                                                                     21
     Command Line Interface Access and
     Security
     Introduction
        All user accounts can access the command line interface through Telnet or Secure SHell (SSH),
        depending on which is enabled. (A Super User or Administrator can enable these access methods by
        selecting the Configuration > Network > Console > Access. By default, Telnet is disabled, and SSH is
        enabled.
        The CLI commands available will depend on the user account accessing the command line interface. For
        example: the console command is only available to the Super User, Administrator, and Network Only
        User accounts.
        Telnet for basic access. Telnet provides the basic security of authentication by user name and
        password, but not the high-security benefits of encryption.
        SSH for high-security access. If you use the high security of TLS for the Web interface, use Secure
        SHell (SSH) for access to the command line interface. SSH encrypts user names, passwords and
        transmitted data.
        The interface, user accounts, and user access rights are the same whether you access the command line
        interface through SSH or Telnet, but to use SSH, you must first configure SSH and have an SSH client
        program installed on your computer.
22                                                                                                   Security Handbook
          Note: Alternatively, from a command line interface such as the command prompt on Windows operating
          systems, you can use FTP or Secure CoPy (SCP) to transfer the host key file.
              • Display the fingerprint of the SSH host key for SSH version 2. Most SSH clients display the
                fingerprint at the start of a session. Compare the fingerprint displayed by the client to the fingerprint
                that you recorded from the Web interface or command line interface of the Management Card or
                device.
Security Handbook                                                                                                     23
     Web Interface Access and Security
24                                                                                                    Security Handbook
            Parameter      Description
            Issued To:     If you do not use the IP address or DNS name that was
                           specified for the certificate, authentication fails, and you
                           receive an error message asking if you want to continue. For
                           a server certificate generated by default by the Management
                           Card or device, this field displays the serial number of the
                           Management Card or device instead. Organization (O),
                           Organizational Unit (OU), and Locality, Country: The
                           name, organizational unit, and location of the organization
                           using the server certificate. For a server certificate generated
                           by default by the Management Card or device, the
                           Organizational Unit (OU) field displays “N/A.” Serial
                           Number: The serial number of the server certificate.
                           Issued on: The date and time at which the certificate was
                           issued.
            Validity:
                           Expires on: The date and time at which the certificate
                           expires.
Security Handbook                                                                             25
     RADIUS
         Authentication
         Note: RADIUS user names used with APC Network Management Cards or devices are limited to 64
         characters.
         On the Configuration tab, select Security on the top menu bar. Then, under Remote Users on the left
         navigation menu, select authentication to define an authentication method:
             • Local Authentication Only: RADIUS is disabled. Local authentication is enabled.
             • RADIUS, then Local Authentication: Both RADIUS and local authentication are enabled.
               Authentication is requested from the RADIUS server first; local authentication is used only if the
               RADIUS server fails to respond.
             • RADIUS Only: RADIUS is enabled. Local authentication is disabled.
         Note: If RADIUS Only is selected, and the RADIUS server is unavailable, improperly identified, or
         improperly configured, remote access is unavailable to all users. You must use a serial connection to the
         command line interface and change the RADIUS access setting to local or radiusLocal to regain access.
         For example, the command to change the access setting to local would be: radius -a local.
         Note: RADIUS configuration supports Password Authentication Protocol (PAP) only.
         Note: To login serially to RADIUS, Remote Authentication Override (Configuration > Security >
         Session Management) and Serial Remote Authentication Override (Configuration > Security >
         Local Users > Management) must be enabled. For more information, see the NMC User Guide.
     RADIUS
         To configure RADIUS, on the Configuration tab, select Security on the top menu bar. Then, under
         Remote Users on the left navigation menu, select RADIUS.
           Settings                     Description
26                                                                                               Security Handbook
              Settings                    Description
Skip Test and Apply Do not test the RADIUS server configuration.
Security Handbook                                                                                                27
         # Attributes
         #
         ATTRIBUTE APC-Service-Type 1 integer APC
         ATTRIBUTE APC-Outlets 2 string APC
         VALUE APC-Service-Type Admin 1
         VALUE APC-Service-Type Device 2
         VALUE APC-Service-Type ReadOnly 3
         #
         # For devices with outlet users only
         #
         VALUE APC-Service-Type Outlet 4
         Note: The information below applies to AP8xxx SKUs when using the Network Port Sharing (NPS)
         feature.
         # give user access to outlets 1,2, and 3 on unit 1,
         # outlet 7 on unit 2, outlets 1 through 6
         # on unit 3, and outlets 1,2,4 through 6, 7 through 10,
         # and 20 on unit 4
         newOutletUser Auth-Type = Local, User-Password = "newoutlets"
         APC-Service-Type = Outlet,
         APC-Outlets = "1[1,2,3];2[7];3[1-6];4[1,2,4-6,7-10,20];"
         Note: See the following related topics:
             • Types of User Accounts for information on the three basic user permission levels (Super User/
               Administrator, Device User, and Read-Only User). If your APC device has an additional user
               account type, e.g., outlet user for a Switched Rack PDU, see the User’s Guide provided with your
               device for information on the additional account type.
             • Supported RADIUS Servers for information on RADIUS servers tested and supported by APC.
28                                                                                            Security Handbook
     Example with UNIX shadow passwords
          If UNIX shadow password files are used (/etc/passwd) with the RADIUS dictionary files, the following two
          methods can be used to authenticate users:
              • If all UNIX users have administrative privileges, add the following to the RADIUS “user” file. To
                allow only Device Users, change the APC-Service-Type to Device.
                DEFAULT Auth-Type = System
                APC-Service-Type = Admin
              • Add user names and attributes to the RADIUS "user" file, and verify the password against /etc/
                passwd. The following example is for users bconners and thawk:
                bconners Auth-Type = System
                APC-Service-Type = Admin
                thawk Auth-Type = System
                APC-Service-Type = Outlet
                APC-Outlets = "1,2,3"
          Additionally, the Network Management Card provides a mechanism for RADIUS to be overridden on a
          per-user basis. This allows a specific account to login serially even when the NMC authentication is set to
          RADIUS. To enable this feature, navigate to Configuration > Security > Session Management and
          enable the Remote Authentication Override feature. Now you can go into each user account
          (Configuration > Security > Local Users > Management) and enable the Serial Remote Authentication
          Override check box for each user you want to allow this override for.
Security Handbook                                                                                                   29
     Secure Disposal Guidelines
     Introduction
         This topic outlines how to reset the Network Management Card to its default settings and erase all user
         information and configurations.
30                                                                                              Security Handbook
     Appendix 1: Network Management Card
     Security Deployment Guide
     Overview
          As network security continues to grow and change in the fast-paced IT industry, user requirements for
          security solutions are becoming a requirement for system delivery. The Network Management Card
          (NMC) interfaces are implemented to provide users with as much flexibility as possible. Industry standard
          security implementation coupled with the flexibility of the Network Management Card, enables products to
          exist in different user environments.
     Physical Security
          Deploy the equipment in a secure location
          Custodians should secure equipment from unauthorized physical access.
              • Access should be restricted to those who require access to maintain the equipment.
              • Restricted areas should be clearly marked for authorized personnel only.
              • Restricted areas should be secured by locked doors.
              • Access to the restricted areas should produce a physical or electronic audit trail.
     Description of Risk
          Attackers with physical access to covered equipment can access the device without authorization.
     Recommendations
          Physical security must be in place to control physical access to restricted areas and facilities containing
          devices. Devices should be locked behind cabinets or protected by physical restraints that prevent
          unauthorized access or removal from restricted areas. Access to areas containing covered equipment
          should only be granted to personnel who require access based on their job function.
          Restricted areas should display signs that clearly indicate access is for authorized personnel only.
          Facilities containing covered devices should give minimum indication of their purpose, with no obvious
          signs identifying the presence of related functions.
Security Handbook                                                                                                  31
         Physical access control devices, such as key card readers, doors and cabinet locks, should be tested
         prior to use and on a periodic basis (e.g. annually). Resource custodians should produce physical or
         electronic audit trails to record all personnel's physical access to restricted areas for security incident
         investigation. Inventory of who has physical access to control devices should be regularly reviewed, and
         any inappropriate access identified during the review should be promptly removed.
     Device Security
         Note: For more information on Device Security options, refer to Appendix 2: Network Management
         Card Security Hardening Checklist.
     Privileged Accounts
         Privileged and super-user accounts (Administrator, root, etc.) must not be used for non-administrator
         activities. Network services must run under accounts assigned the minimum necessary privileges.
         Also minimize the number of local accounts.
Certificates
     Use of Authentication
         Network services and local (console) device access must require authentication by means of passphrases
         or other secure authentication mechanisms unless the explicit purpose of the service/device is to provide
         unauthenticated access. Schneider Electric supports the authentication and authorization functions of
         Remote Authentication Dial-In User Service (RADIUS). You can configure the device to use RADIUS to
         authenticate remote users. [Configuration;Security;Remote Users;Authentication]
     Minimum Protocol
         Set the minimum allowed Transport Layer Security Protocol that Hypertext Transfer Protocol over Secure
         Sockets Layer (HTTPS) uses to secure the communication between the browser and the device. This
         should be set to TLS 1.2. [Configuration;Network;Webaccess]
32                                                                                                 Security Handbook
     Logging
          Schneider Electric recommends enabling the generation (and therefore, the logging) of Syslog messages
          for events that have Syslog configured as a notification method. To configure notification methods for
          events, navigate to Configuration > Logs > Syslogs. Use the available functionality to integrate with
          Syslog. Use TCP/IP only for logging.
          Note: NTP should be enabled on the device.
     No Unnecessary Services
          If a network service is not necessary for the intended purpose or operation of the device, ensure that
          service is not running.
     Network Security
          When deploying a Network Management Card to a production environment, Schneider Electric strongly
          recommends that the below key configuration changes are made.
Firewalls
Recommendations
Security Handbook                                                                                                     33
         Allow incoming traffic from Information Security scanners
         Configure your firewalls to allow network-based scanning by Information Security (IS) vulnerability
         scanners. IS should scan hosts on the network and determine if hosts are vulnerable to common network
         threats, or if a system appears to have been compromised.
     Network Segmentation
         Schneider Electric strongly recommends that network traffic to the device’s management interface is
         separated, either physically or logically, from normal network traffic. A flat network architecture makes it
         easier for malicious actors to move around within the network; whereas with network segmentation,
         organizations can enhance network security by controlling access to sensitive data in the form of enabling
         or denying network access. A strong security policy entails segmenting the network into multiple zones,
         with varying security requirements, and rigorously enforcing the policy on what is allowed to move from
         zone to zone.
34                                                                                                Security Handbook
     Appendix 2: Network Management Card
     Security Hardening Checklist
          Upgrade to the latest firmware version
          Visit the Schneider Electric website to verify you are running the latest firmware for your device. This will
          help ensure security vulnerabilities and features are up-to-date for your protection. NOTE: If you upgrade
          to firmware version 2.0.x or higher, you cannot downgrade to a firmware version lower than 2.0.x.
          Disable FTP
          Disable FTP when it is not in use to help harden security on your device. If SSH is enabled, SCP, which is
          more secure than FTP, can be used for file transfers. Note: By default, FTP is disabled.
Security Handbook                                                                                                   35
     Disable Super User account
     Ensure there is at least one Administrator account enabled on your device. Once an Administrator
     account is configured, it is recommended that the Super User account is disabled. The Administrator
     account has the same privileges as the Super User account.
36                                                                                         Security Handbook
Copyright Notices
Cryptlib Cryptology Library
Cryptlib copyright © Digital Data Security New Zealand Ltd 1998.
Berkeley Database
Copyright © 1991, 1993 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
    1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
       following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
       following disclaimer in the documentation and/or other materials provided with the distribution.
    3. All advertising materials mentioning features or use of this software must display the following
       acknowledgement: This product includes software developed by the University of California, Berkeley
       and its contributors.
    4. Neither the name of the University nor the names of its contributors may be used to endorse or promote
       products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
Lua
Copyright © 1994–2021 Lua.org, PUC-Rio.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated
documentation files (the "Software"), to deal in the Software without restriction, including without limitation the
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions ofthe
Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH
THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
                    APC by Schneider Electric
                   Worldwide Customer Support
Customer support for this or any other product is available at no charge in any of the following ways:
  • Visit the APC by Schneider Electric web site, to access documents in the APC Knowledge Base
    and to submit customer support requests.
    – www.apc.com (Corporate Headquarters)
      Connect to localized APC by Schneider Electric web site for specific countries, each of which
      provides customer support information.
    – www.apc.com/support/
      Global support searching APC Knowledge Base and using e-support.
  • Contact the APC by Schneider Electric Customer Support Center by telephone or e-mail.
    – Local, country-specific centers: go to www.apc.com/support/contact for contact information.
For information on how to obtain local customer support, contact the APC by Schneider Electric
representative or other distributor from whom you purchased your APC by Schneider Electric product.
       © 2022 Schneider Electric. All Rights Reserved. Schneider Electric, APC and Network Management
          Card are trademarks and the property of Schneider Electric SE, its subsidiaries and affiliated
                    companies. All other trademarks are property of their respective owners.
990-91251H-001 8/2022