Avaya Aura Conferencing Security Guide
Avaya Aura Conferencing Security Guide
Release 8.0
May 2013
© 2013, Avaya Inc. YOU DO NOT WISH TO ACCEPT THESE TERMS OF USE, YOU
All Rights Reserved. MUST NOT ACCESS OR USE THE HOSTED SERVICE OR
AUTHORIZE ANYONE TO ACCESS OR USE THE HOSTED
Notice SERVICE.
While reasonable efforts have been made to ensure that the Licenses
information in this document is complete and accurate at the time of
printing, Avaya assumes no liability for any errors. Avaya reserves THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA
the right to make changes and corrections to the information in this WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO,
document without the obligation to notify any person or organization UNDER THE LINK “AVAYA SOFTWARE LICENSE TERMS (Avaya
of such changes. Products)” OR SUCH SUCCESSOR SITE AS DESIGNATED BY
AVAYA, ARE APPLICABLE TO ANYONE WHO DOWNLOADS,
Documentation disclaimer USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED
“Documentation” means information published in varying mediums FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AVAYA
which may include product information, operating instructions and CHANNEL PARTNER (AS APPLICABLE) UNDER A COMMERCIAL
performance specifications that are generally made available to users AGREEMENT WITH AVAYA OR AN AVAYA CHANNEL PARTNER.
of products. Documentation does not include marketing materials. UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING,
Avaya shall not be responsible for any modifications, additions, or AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE
deletions to the original published version of Documentation unless WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN AVAYA
such modifications, additions, or deletions were performed by or on AFFILIATE OR AN AVAYA CHANNEL PARTNER; AVAYA
the express behalf of Avaya. End User agrees to indemnify and hold RESERVES THE RIGHT TO TAKE LEGAL ACTION AGAINST YOU
harmless Avaya, Avaya's agents, servants and employees against all AND ANYONE ELSE USING OR SELLING THE SOFTWARE
claims, lawsuits, demands and judgments arising out of, or in WITHOUT A LICENSE. BY INSTALLING, DOWNLOADING OR
connection with, subsequent modifications, additions or deletions to USING THE SOFTWARE, OR AUTHORIZING OTHERS TO DO SO,
this documentation, to the extent made by End User. YOU, ON BEHALF OF YOURSELF AND THE ENTITY FOR WHOM
YOU ARE INSTALLING, DOWNLOADING OR USING THE
Link disclaimer SOFTWARE (HEREINAFTER REFERRED TO
Avaya is not responsible for the contents or reliability of any linked INTERCHANGEABLY AS “YOU” AND “END USER”), AGREE TO
websites referenced within this site or Documentation provided by THESE TERMS AND CONDITIONS AND CREATE A BINDING
Avaya. Avaya is not responsible for the accuracy of any information, CONTRACT BETWEEN YOU AND AVAYA INC. OR THE
statement or content provided on these sites and does not APPLICABLE AVAYA AFFILIATE (“AVAYA”).
necessarily endorse the products, services, or information described Avaya grants You a license within the scope of the license types
or offered within them. Avaya does not guarantee that these links will described below, with the exception of Heritage Nortel Software, for
work all the time and has no control over the availability of the linked which the scope of the license is detailed below. Where the order
pages. documentation does not expressly identify a license type, the
Warranty applicable license will be a Designated System License as set forth
below in the Designated System(s) License (DS) section as
Avaya provides a limited warranty on Avaya hardware and software. applicable. The applicable number of licenses and units of capacity
Refer to your sales agreement to establish the terms of the limited for which the license is granted will be one (1), unless a different
warranty. In addition, Avaya’s standard warranty language, as well as number of licenses or units of capacity is specified in the
information regarding support for this product while under warranty is documentation or other materials available to You. “Software” means
available to Avaya customers and other parties through the Avaya computer programs in object code, provided by Avaya or an Avaya
Support website: https://support.avaya.com/helpcenter/ Channel Partner, whether as stand-alone products, pre-installed on
getGenericDetails?detailId=C20091120112456651010 under the link hardware products, and any upgrades, updates, patches, bug fixes,
“Warranty & Product Lifecycle” or such successor site as designated or modified versions thereto. “Designated Processor” means a single
by Avaya. Please note that if You acquired the product(s) from an stand-alone computing device. “Server” means a set of Designated
authorized Avaya Channel Partner outside of the United States and Processors that hosts (physically or virtually) a software application
Canada, the warranty is provided to You by said Avaya Channel to be accessed by multiple users. “Instance” means a single copy of
Partner and not by Avaya. the Software executing at a particular time: (i) on one physical
“Hosted Service” means an Avaya hosted service subscription that machine; or (ii) on one deployed software virtual machine (“VM”) or
You acquire from either Avaya or an authorized Avaya Channel similar deployment.
Partner (as applicable) and which is described further in Hosted SAS License types
or other service description documentation regarding the applicable
hosted service. If You purchase a Hosted Service subscription, the Designated System(s) License (DS). End User may install and use
foregoing limited warranty may not apply but You may be entitled to each copy or an Instance of the Software only: 1) on a number of
support services in connection with the Hosted Service as described Designated Processors up to the number indicated in the order; or 2)
further in your service description documents for the applicable up to the number of Instances of the Software as indicated in the
Hosted Service. Contact Avaya or Avaya Channel Partner (as order, Documentation, or as authorized by Avaya in writing. Avaya
applicable) for more information. may require the Designated Processor(s) to be identified in the order
by type, serial number, feature key, Instance, location or other
Hosted Service specific designation, or to be provided by End User to Avaya through
THE FOLLOWING APPLIES ONLY IF YOU PURCHASE AN AVAYA electronic means established by Avaya specifically for this purpose.
HOSTED SERVICE SUBSCRIPTION FROM AVAYA OR AN AVAYA Named User License (NU). You may: (i) install and use each copy or
CHANNEL PARTNER (AS APPLICABLE), THE TERMS OF USE Instance of the Software on a single Designated Processor or Server
FOR HOSTED SERVICES ARE AVAILABLE ON THE AVAYA per authorized Named User (defined below); or (ii) install and use
WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO UNDER each copy or Instance of the Software on a Server so long as only
THE LINK “Avaya Terms of Use for Hosted Services” OR SUCH authorized Named Users access and use the Software. “Named
SUCCESSOR SITE AS DESIGNATED BY AVAYA, AND ARE User”, means a user or device that has been expressly authorized by
APPLICABLE TO ANYONE WHO ACCESSES OR USES THE Avaya to access and use the Software. At Avaya’s sole discretion, a
HOSTED SERVICE. BY ACCESSING OR USING THE HOSTED “Named User” may be, without limitation, designated by name,
SERVICE, OR AUTHORIZING OTHERS TO DO SO, YOU, ON corporate function (e.g., webmaster or helpdesk), an e-mail or voice
BEHALF OF YOURSELF AND THE ENTITY FOR WHOM YOU ARE mail account in the name of a person or corporate function, or a
DOING SO (HEREINAFTER REFERRED TO INTERCHANGEABLY directory entry in the administrative database utilized by the Software
AS “YOU” AND “END USER”), AGREE TO THE TERMS OF USE. IF that permits one user to interface with the Software.
YOU ARE ACCEPTING THE TERMS OF USE ON BEHALF A
COMPANY OR OTHER LEGAL ENTITY, YOU REPRESENT THAT Heritage Nortel Software
YOU HAVE THE AUTHORITY TO BIND SUCH ENTITY TO THESE “Heritage Nortel Software” means the software that was acquired by
TERMS OF USE. IF YOU DO NOT HAVE SUCH AUTHORITY, OR IF Avaya as part of its purchase of the Nortel Enterprise Solutions
Business in December 2009. The Heritage Nortel Software is the HOSTING OF AVAYA PRODUCTS MUST BE AUTHORIZED IN
software contained within the list of Heritage Nortel Products located WRITING BY AVAYA AND IF THOSE HOSTED PRODUCTS USE
at https://support.avaya.com/LicenseInfo under the link “Heritage OR EMBED CERTAIN THIRD PARTY SOFTWARE, INCLUDING
Nortel Products” or such successor site as designated by Avaya. For BUT NOT LIMITED TO MICROSOFT SOFTWARE OR CODECS,
Heritage Nortel Software, Avaya grants Customer a license to use THE AVAYA CHANNEL PARTNER IS REQUIRED TO
Heritage Nortel Software provided hereunder solely to the extent of INDEPENDENTLY OBTAIN ANY APPLICABLE LICENSE
the authorized activation or authorized usage level, solely for the AGREEMENTS, AT THE AVAYA CHANNEL PARTNER’S EXPENSE,
purpose specified in the Documentation, and solely as embedded in, DIRECTLY FROM THE APPLICABLE THIRD PARTY SUPPLIER.
for execution on, or for communication with Avaya equipment.
Charges for Heritage Nortel Software may be based on extent of WITH RESPECT TO CODECS, IF THE AVAYA CHANNEL
PARTNER IS HOSTING ANY PRODUCTS THAT USE OR EMBED
activation or use authorized as specified in an order or invoice.
THE G.729 CODEC, H.264 CODEC, OR H.265 CODEC, THE
Copyright AVAYA CHANNEL PARTNER ACKNOWLEDGES AND AGREES
THE AVAYA CHANNEL PARTNER IS RESPONSIBLE FOR ANY
Except where expressly stated otherwise, no use should be made of AND ALL RELATED FEES AND/OR ROYALTIES. THE G.729
materials on this site, the Documentation, Software, Hosted Service, CODEC IS LICENSED BY SIPRO LAB TELECOM INC. SEE
or hardware provided by Avaya. All content on this site, the WWW.SIPRO.COM/CONTACT.HTML. THE H.264 (AVC) CODEC IS
documentation, Hosted Service, and the product provided by Avaya
LICENSED UNDER THE AVC PATENT PORTFOLIO LICENSE FOR
including the selection, arrangement and design of the content is THE PERSONAL USE OF A CONSUMER OR OTHER USES IN
owned either by Avaya or its licensors and is protected by copyright WHICH IT DOES NOT RECEIVE REMUNERATION TO: (I) ENCODE
and other intellectual property laws including the sui generis rights VIDEO IN COMPLIANCE WITH THE AVC STANDARD (“AVC
relating to the protection of databases. You may not modify, copy, VIDEO”) AND/OR (II) DECODE AVC VIDEO THAT WAS ENCODED
reproduce, republish, upload, post, transmit or distribute in any way BY A CONSUMER ENGAGED IN A PERSONAL ACTIVITY AND/OR
any content, in whole or in part, including any code and software WAS OBTAINED FROM A VIDEO PROVIDER LICENSED TO
unless expressly authorized by Avaya. Unauthorized reproduction, PROVIDE AVC VIDEO. NO LICENSE IS GRANTED OR SHALL BE
transmission, dissemination, storage, and or use without the express IMPLIED FOR ANY OTHER USE. ADDITIONAL INFORMATION
written consent of Avaya can be a criminal, as well as a civil offense FOR H.264 (AVC) AND H.265 (HEVC) CODECS MAY BE
under the applicable law. OBTAINED FROM MPEG LA, L.L.C. SEE HTTP://
Virtualization WWW.MPEGLA.COM.
The following applies if the product is deployed on a virtual machine. Compliance with Laws
Each product has its own ordering code and license types. Note, You acknowledge and agree that it is Your responsibility for
unless otherwise stated, that each Instance of a product must be complying with any applicable laws and regulations, including, but not
separately licensed and ordered. For example, if the end user limited to laws and regulations related to call recording, data privacy,
customer or Avaya Channel Partner would like to install two intellectual property, trade secret, fraud, and music performance
Instances of the same type of products, then two products of that rights, in the country or territory where the Avaya product is used.
type must be ordered.
Preventing Toll Fraud
Third Party Components
“Toll Fraud” is the unauthorized use of your telecommunications
“Third Party Components” mean certain software programs or system by an unauthorized party (for example, a person who is not a
portions thereof included in the Software or Hosted Service may corporate employee, agent, subcontractor, or is not working on your
contain software (including open source software) distributed under company's behalf). Be aware that there can be a risk of Toll Fraud
third party agreements (“Third Party Components”), which contain associated with your system and that, if Toll Fraud occurs, it can
terms regarding the rights to use certain portions of the Software result in substantial additional charges for your telecommunications
(“Third Party Terms”). As required, information regarding distributed services.
Linux OS source code (for those products that have distributed Linux
OS source code) and identifying the copyright holders of the Third Avaya Toll Fraud intervention
Party Components and the Third Party Terms that apply is available
If You suspect that You are being victimized by Toll Fraud and You
in the products, Documentation or on Avaya’s website at: https://
support.avaya.com/Copyright or such successor site as designated need technical assistance or support, call Technical Service Center
by Avaya. The open source software license terms provided as Third Toll Fraud Intervention Hotline at +1-800-643-2353 for the United
Party Terms are consistent with the license rights granted in these States and Canada. For additional support telephone numbers, see
Software License Terms, and may contain additional rights benefiting the Avaya Support website: https://support.avaya.com or such
successor site as designated by Avaya.
You, such as modification and distribution of the open source
software. The Third Party Terms shall take precedence over these Security Vulnerabilities
Software License Terms, solely with respect to the applicable Third
Party Components to the extent that these Software License Terms Information about Avaya’s security support policies can be found in
impose greater restrictions on You than the applicable Third Party the Security Policies and Support section of https://
Terms. support.avaya.com/security.
The following applies only if the H.264 (AVC) codec is distributed with Suspected Avaya product security vulnerabilities are handled per the
the product. THIS PRODUCT IS LICENSED UNDER THE AVC Avaya Product Security Support Flow (https://
PATENT PORTFOLIO LICENSE FOR THE PERSONAL USE OF A support.avaya.com/css/P8/documents/100161515).
CONSUMER OR OTHER USES IN WHICH IT DOES NOT RECEIVE Downloading Documentation
REMUNERATION TO (i) ENCODE VIDEO IN COMPLIANCE WITH
THE AVC STANDARD (“AVC VIDEO”) AND/OR (ii) DECODE AVC For the most current versions of Documentation, see the Avaya
VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A Support website: https://support.avaya.com, or such successor site
PERSONAL ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO as designated by Avaya.
PROVIDER LICENSED TO PROVIDE AVC VIDEO. NO LICENSE IS Contact Avaya Support
GRANTED OR SHALL BE IMPLIED FOR ANY OTHER USE.
ADDITIONAL INFORMATION MAY BE OBTAINED FROM MPEG LA, See the Avaya Support website: https://support.avaya.com for
L.L.C. SEE HTTP://WWW.MPEGLA.COM. product or Hosted Service notices and articles, or to report a problem
with your Avaya product or Hosted Service. For a list of support
Service Provider telephone numbers and contact addresses, go to the Avaya Support
THE FOLLOWING APPLIES TO AVAYA CHANNEL PARTNER’S website: https://support.avaya.com (or such successor site as
HOSTING OF AVAYA PRODUCTS OR SERVICES. THE PRODUCT designated by Avaya), scroll to the bottom of the page, and select
OR HOSTED SERVICE MAY USE THIRD PARTY COMPONENTS Contact Avaya Support.
SUBJECT TO THIRD PARTY TERMS AND REQUIRE A SERVICE
PROVIDER TO BE INDEPENDENTLY LICENSED DIRECTLY FROM
THE THIRD PARTY SUPPLIER. AN AVAYA CHANNEL PARTNER’S
Trademarks
The trademarks, logos and service marks (“Marks”) displayed in this
site, the Documentation, Hosted Service(s), and product(s) provided
by Avaya are the registered or unregistered Marks of Avaya, its
affiliates, its licensors, its suppliers, or other third parties. Users are
not permitted to use such Marks without prior written consent from
Avaya or such third party which may own the Mark. Nothing
contained in this site, the Documentation, Hosted Service(s) and
product(s) should be construed as granting, by implication, estoppel,
or otherwise, any license or right in and to the Marks without the
express written permission of Avaya or the applicable third party.
Avaya is a registered trademark of Avaya Inc.
Chapter 1: Introduction............................................................................................................ 8
Purpose.................................................................................................................................. 8
Prerequisites..................................................................................................................... 8
Intended audience................................................................................................................... 8
Related resources................................................................................................................... 8
Documentation.................................................................................................................. 8
Training.......................................................................................................................... 10
Viewing Avaya Mentor videos........................................................................................... 10
Support................................................................................................................................. 11
Warranty............................................................................................................................... 11
Chapter 2: Platform security overview................................................................................. 12
BIOS password control.......................................................................................................... 12
GRUB password control......................................................................................................... 13
Administrative user account names......................................................................................... 13
Administrative user roles........................................................................................................ 14
Primary role.......................................................................................................................... 15
Sudo access control.............................................................................................................. 15
Platform user management tool.............................................................................................. 15
Administrative account timers................................................................................................. 16
Account lockout..................................................................................................................... 16
Password complexity............................................................................................................. 17
Password changes.......................................................................................................... 19
Inactive platform account auditing........................................................................................... 19
Root user access.................................................................................................................. 20
Individual user accounts......................................................................................................... 20
Preconfigured accounts......................................................................................................... 21
Remote system accounts....................................................................................................... 22
Administrator database backup.............................................................................................. 22
Platform warning banners...................................................................................................... 22
Chapter 3: Platform administrator security management................................................... 23
Modifying password complexity rules–menu............................................................................ 23
Configuring the GRUB password............................................................................................ 24
Creating individual user accounts–menu................................................................................. 25
Deleting a user account......................................................................................................... 26
Modifying user roles—menu................................................................................................... 27
Changing the state of a user account—menu.......................................................................... 27
Listing server user accounts—menu....................................................................................... 28
Managing sudo access—menu............................................................................................... 29
Resetting a platform user account password—menu................................................................ 30
Purpose
This document contains information about how to perform Avaya Aura® Conferencing administration
tasks to manage data and security.
Prerequisites
Before you perform the administration tasks to manage data and security, you must:
• Complete the Avaya Aura® Conferencing installation.
• Know how to use Element Manager Console and Provisioning Client.
Intended audience
This document is intended for people who perform the product or solution system administration
tasks.
Related resources
Documentation
Download the following related documents at http://support.avaya.com.
The Avaya Support website also includes the latest information about product compatibility, ports
and Avaya Aura® Conferencing releases.
Administration
Document Title Use this document to: Audience
number
04-604378 Administering Avaya Aura® Perform system-wide administration System
Conferencing tasks administrators
04-604403 Migrating Avaya Aura® Perform system-wide security System
Conferencing administration and backup/restore administrators
tasks
04-604398 Maintaining and Perform maintenance and System
Troubleshooting Avaya Aura® troubleshooting tasks. administrators
Conferencing
Understand logs and fault tracking. Partners,
Services, and
Support
personnel
Implementation
Document Title Use this document to: Audience
number
04-604418 Deploying Avaya Aura® Perform installation and configuration Partners,
Conferencing: Basic tasks Services, and
Installation Support
personnel
04-604363 Deploying Avaya Aura® Perform installation and configuration Partners,
Conferencing: Advanced tasks Services, and
Installation and Configuration Support
personnel
04-604353 Upgrading Avaya Aura® Perform upgrading and configuration Partners,
Conferencing tasks Services, and
Support
personnel
Supporting
Document Title Use this document to: Audience
number
04–604423 Avaya Aura® Conferencing Collect information about accounting System
Accounting Records Reference records administrators
Customers,
Partners,
Services, and
Support
personnel
Table continues…
Training
The following courses are available on http://www.avaya-learning.com. In the Search field, type the
course code, and click Go to search for the course.
Course code Course title
2U00110O Selling Avaya Aura® Conferencing Solution Learning Bytes
2U00325O Avaya Aura® Conferencing 7 L1 Customer Scenario
3U00260W Designing Avaya Aura® Conferencing
5U00120E Avaya Aura® Conferencing
3204 Avaya Aura® Conferencing Implementation and Maintenance Exam
- In Search, type the product name. On the Search Results page, select Video in the
Content Type column on the left.
• To find the Avaya Mentor videos on YouTube, go to www.youtube.com/AvayaMentor and
perform one of the following actions:
- Enter a key word or key words in the Search Channel to search for a specific product or
topic.
- Scroll down Playlists, and click the name of a topic to see the available list of videos posted
on the website.
Note:
Videos are not available for all products.
Support
Go to the Avaya Support website at http://support.avaya.com for the most up-to-date
documentation, product notices, and knowledge articles. You can also search for release notes,
downloads, and resolutions to issues. Use the online service request system to create a service
request. Chat with live agents to get answers to questions, or request an agent to connect you to a
support team if an issue requires additional expertise.
Warranty
Detailed terms and conditions are contained in the sales agreement or other applicable
documentation and establish the terms of the limited warranty. In addition, the Avaya standard
warranty description and details for support under warranty are available at Avaya Support under
More Resources for Maintenance and Warranty Information, see https://support.avaya.com/.
This chapter contains information related to platform security configuration, including platform
administrator accounts, roles, and access.
• The administrator does not press the F1 key during the early stages of BIOS initialization. If a
power-on password is configured (not recommended), BIOS requires the administrator to enter
the password to allow the system to continue past the BIOS initialization. If configured, the
administrative password is also accepted.
If an administrator password is configured, an administrator entering BIOS with only a power-on
password receives access to the following menus:
• System Summary—This menu provides information such as processor model, USB devices,
and memory information.
• System Information—This menu provides information such as the machine type and model
number, serial number, firmware levels, and installed system cards.
When configuring the administrator password, changing the value of the power-on password
changeable by user field to Yes provides limited BIOS access to the administrator. The following are
the additional menu items available:
• System Security—This menu provides the facility to change or delete the power-on password.
The following general points also apply to administrative and power-on BIOS passwords:
• Each password can be up to seven characters in length.
• The passwords can consist of any characters.
• If both passwords are configured, a forgotten power-on password can be reset (deleted and re-
configured) by entering the BIOS with the administrative password.
• If a single password is set, and is forgotten, it cannot be recovered using the BIOS menu.
• If both the administrative and power-on password are set, and the administrative password is
forgotten, it cannot be recovered using the BIOS menu.
• Neither password is affected when you restore the configuration of the main BIOS to the
factory default configuration.
The system security administrator defines the password requirements using the pwConfig tool. For
more information about the pwConfig tool, see Modifying password complexity rules–menu on
page 23.
Primary role
The primary role of the administrator defines the administrator’s primary group. The primary role
determines permissions and group ownership for any files that are generated by the administrator.
Any tools that extract or create files use the administrator’s primary role to determine the
appropriate group settings. The primary role is the first role assigned during account creation. An
SSA or root user can change the primary role for an administrator.
In the user management tool (userMgt), the primary role of an administrator is the first role that
appears in the list of assigned roles. For example, if the list appears as follows: SSA, AA, BA; the
primary role of the administrator is SSA.
All roles, other than the Backup Administrator and OSS Administrator roles, are intended to manage
some aspect of the system. Because of this and the use of discretionary access groups to control
access to system resources, administrators with a primary role of SSA, SA, AA, or DBA have a
primary GID that is traditionally reserved for system accounts (less than 500).
User Configuration Manager provides the following menu options for the SSA role and the sudo
login:
SSA sudo
• Add a new user • Add a new user
• Delete a user • Delete a user
• Modify user roles • Modify user roles
• Enable or disable the user local authentication • Enable or disable the user local authentication
• List the users on the system • List the users on the system
• Reset the user password • sudo access management
• Load the restored users • Reset the user password
• Exit • Load the restored users
• Exit
Account lockout
To reduce the effectiveness of password guessing attacks, you can configure account lockout on the
system. If you enable account lockout, the system temporarily locks an account after a specified
number of log on failures.
To enable account lockout, use the pwConfig tool to configure the 'Deny after this many log on
failures' parameter to a value other than zero. To subsequently disable account lockout, change the
value back to zero.
To configure the length of time that the account remains locked out, use the pwConfig tool to
configure the Unlock account duration (seconds) parameter. If you disable account lockout, the
Unlock account duration parameter has no effect. For more information, see Modifying password
complexity rules–menu on page 23.
If the system locks an account because of consecutive failed attempts to log on, the administrator
cannot log on to the system until the lockout period expires. An SSA can unlock an administrator’s
account, during the lockout period, by using the userMgt tool to disable and subsequently enable the
locked out administrator. Additionally, after three consecutive failed access attempts, the SSH or
SFTP connection terminates and the user must re-establish the connection to log on.
After an account reaches the lockout threshold, the system generates a security log.
Password complexity
You can configure password policy rules to define the appropriate characters used for administrator
passwords. The administrator configures these passwords using either /usr/bin/passwd or the
userMgt tool.
The password complexity settings only affect subsequently configured passwords; they do not affect
current passwords.
You manage password complexity on a per-server basis. There is no automatic password
complexity synchronization performed between servers. Therefore, if you change any value on one
server, you must manually change it on all of the other servers. For more information about the
parameters, see the following table. For more information about how to configure the parameters,
see Modifying password complexity rules–menu on page 23.
Parameter Description
Minimum lowercase chars This parameter specifies the minimum number of lowercase characters
(a–z) that the password must contain. The system rejects passwords
that contain fewer lowercase characters.
The range of values allowed is 0-10. Default: 2
Minimum uppercase chars This parameter specifies the minimum number of uppercase characters
(A–Z) that the password must contain. The system rejects passwords
that contain fewer uppercase characters.
The range of values allowed is 0-10. Default: 2
Minimum digits This parameter specifies the minimum number of digit characters (0–9)
that the password must contain. The system rejects passwords that
contain fewer digit characters.
The range of values allowed is 0-10. Default: 2
Minimum special chars This parameter specifies the minimum number of special characters
that the password must contain. Special characters are: . @ -_ & ' ^ ? !
( ) , / \ : ; ~ = +. The system rejects passwords that contain fewer
special characters.
The range of values allowed is 0-10. Default: 0
Table continues…
Parameter Description
Minimum change chars This parameter specifies the minimum number of characters by which
the new password must differ from the previous password. The system
ignores this value if either one half of the characters in the new
password are different, or if there are more than 23 characters in the
new password.
The range of values allowed is 0-10. Default: 0
Minimum password length This parameter specifies the minimum number of total characters a
password must contain. The system rejects passwords that contain
fewer characters.
The range of values allowed is 4-32. Default: 8.
Maximum consecutive repeat This parameter specifies the maximum number of times a given
chars character can appear consecutively in a valid password. Configure the
value to 0 (zero) to disable Maximum consecutive repeat chars.
The range of values allowed is 0-10. Default: 0
Deny after this many login failures The parameter specifies the number of failed attempts to log in to an
account before the account is locked. Default: 0
Unlock account duration (seconds) This parameter specifies the amount of time for which the account
remains locked after log on failures. Default: 60
Old passwords to remember This parameter specifies the number of previous passwords the system
remembers. Administrators cannot reuse any password on the
remembered list. Regardless of the value of this parameter,
administrators can never reuse the current password. Default: 0.
Maximum password age (days) This parameter specifies the maximum number of days that an
administrator's password can be used. After the specified number of
days, the administrator must change the password to access the
server. If you reduce this value, some existing passwords can
immediately expire. Default: 90
Minimum password age (days) This parameter specifies the minimum number of days between
password changes. This setting discourages administrators from
immediately changing their passwords back to a previously used
password (password flipping). Default: 1
Password change warning (days) This parameter specifies the number of days in advance that users
receive a warning that their passwords will expire. If an administrator
logs on within this number of days before expiry, a message appears to
indicate that the password will expire soon. Default: 7.
Idle session timeout (seconds) This parameter specifies the number of seconds a session can be idle
before it times out. Default: 600 (10 minutes)
Maximum number of concurrent This parameter specifies the number of concurrent login sessions
logins permitted for an account.
Important:
If the default password complexity configuration values (as shown in the preceding table) do not
meet your site requirements, Avaya recommends that you change the values immediately after
installation and deployment, and before you add administrators to the system.
The following non-configurable parameters also apply to password complexity:
• The system uses the Linux CrackLib library to ensure that the password is not based on the
username or on a dictionary word. This library manipulates the new password in various ways
to try and determine if the new password is based on the username or a dictionary word.
• Users must change their passwords during initial log on. Users cannot access the system with
the temporary passwords.
• The password cannot be a palindrome.
Note:
There is no enforcement of password complexity rules for the root user. Ensure that only a very
limited number of individuals know the root password for the servers. Also, take additional care
in choosing the root password since there is no enforcement.
The backup and restore process includes all files related to password complexity.
Related links
Modifying password complexity rules–menu on page 23
Password changes
When administrators use the UNIX passwd command to change their passwords, or when they
change the password during log on (for initial or expired passwords), the system applies all of the
enabled password complexity rules.
When an SSA uses the userMgt tool to change a password, the following rules do not apply:
• Password history (old passwords to remember)
• Case change from previous password
• Characters changed from previous password (Minimum change chars)
For more information about platform user account passwords, see Platform administrator security
management on page 23.
The system does not automatically delete locked out inactive administrator accounts. The site
administrator is responsible for monitoring locked out accounts and deleting them as needed.
Related links
Viewing the status of inactive account auditing on page 31
Enabling inactive account auditing on page 31
Disabling inactive account auditing on page 31
Preconfigured accounts
The installation process automatically creates the following user accounts:
• ntsysadm: This account has two roles: System Security Administrator (SSA) and Application
Administrator (AA). The primary role of this account is SSA. By default, the ntsysadm account
has sudo root access. You can remove full sudo access by logging in to User Configuration
Manager as a root user. This account replaces sysadmin in earlier releases.
• ntsecadm: The primary role of this account is Security Auditor (SA).
• ntappadm: The primary role of this account is AA, which replaces avaya in earlier releases.
• ntbackup: The primary role of this account is Backup Administrator (BA).
• ntdbadm: The primary role of this account is Database Administrator (DBA).
• ntossadm: The primary role of this account is OSS Administrator (OSS). An Operational
Support Server (OSS) uses this account to connect to an Avaya Aura® Conferencing server to
collect OSS logs.
• craft: The primary role of this account is AA, which is used for Avaya Services access.
• init: This account has three roles: SSA, DBA, and AA. The primary role of this account is SSA.
By default, the init account has sudo root access. You can remove full sudo access by logging
in to User Configuration Manager as a root user. This account is used for Avaya Services
access.
For more information about the installation, see the installation method for your system.
Use User Configuration Manager to manage all accounts, including the preconfigured accounts,
except the root account.
• The default password of the preconfigured accounts is password. Change the initial password
when you log in for the first time. To change the password for an account, log in to the account,
and type the command: #>passwd.
• ntossadm is protected using password authentication. The primary role of this account is OSS.
If account lockout is configured for the system, Avaya Aura® Conferencing locks this account if
you enter an incorrect password. Users with the SSA role can use User Configuration Manager
to reset the password for locked accounts.
• ntsysadm, the root account, and any account with the SSA role can be used to create
additional individual user accounts. Additional individual accounts are subject to the same
password complexity profile as the preconfigured accounts. Using ntsysadm, you can delete
preconfigured accounts. All preconfigured accounts are backed up and restored during the
backup and restore process.
Important:
Perform backups after making changes to the warning banner files.
For more information, see Administering Avaya Aura® Conferencing.
Related links
Configuring platform warning banners on page 32
This chapter describes how to manage password complexity requirements, create individual user
accounts, and manage administrator role assignments to control access to the Avaya Aura®
Conferencing servers.
Log in as Security System Administrator (SSA) or as a root user to use the tools for platform
administrator security management.
Role Groups
SSA—System Security Administrator ntsysgrp, ntsecgrp, ntbackupgrp
SA—Security Auditor ntsecgrp
AA—Application Administrator ntappgrp, ntossgrp
BA—Backup Administrator ntbackupgrp
DBA—Database Administrator ntdbgrp, ntappgrp
OSS – OSS Administrator ntossgrp
Procedure
1. Log on to the server as a user with SSA role.
2. At the command prompt, enter:
userMgt
3. If prompted, enter your password.
4. Enter 1 to add a new user.
5. Enter a username for the new user.
6. Enter 0 to have the system select a user ID.
7. Enter the corresponding numbers for the user's roles.
The first role is the user's primary role. Separate multiple role entries with a comma (,).
8. Enter Y to continue adding users.
9. Enter the initial password for the user.
The user must change this password during the initial log on to gain access to the server.
10. Enter the initial password again.
You receive a prompt to continue adding users or to return to the main menu.
Avaya Aura® Conferencing determines the account to transfer the files based on the primary
role of the deleted account. Avaya Aura® Conferencing does not display a warning before
transferring the files. You can keep the transferred files on the system or delete the files. Before
deleting the files, ensure that removing the files does not hinder the system operation.
• If the permissions are higher than or equal to the read and write permissions of the group ,
Avaya Aura® Conferencing deletes the files. Transferring the files to a no-login account with
these settings could make the files unmanageable by the user accounts in the same group.
Avaya Aura® Conferencing displays a warning and a confirmation before deleting the files.
Procedure
1. Log on to the server as SSA.
2. At the command prompt, enter:
userMgt
3. If Avaya Aura® Conferencing prompts you for a password, type your password.
4. To delete a user, type 2.
5. From the list of users, select the user to delete by entering the associated number of the
user.
9. Enter 9 to exit.
Important:
After you disable inactive account auditing, the system does not re-enable previously
locked out administrator accounts. You must manually re-enable any locked out
administrator accounts.
Related links
Inactive platform account auditing on page 19
cp /var/tmp/<motd_filename> /etc/motd
Related links
Platform warning banners on page 22
This chapter contains information about system security configuration and management.
Parameter Description
Minimum Password Length This parameter specifies the minimum number of total characters a
password must contain.
The range of values allowed is 4-32. Default: 8.
The Minimum Password Length must be equal to or greater than the
total of the Minimum Lowercase Characters, Minimum Uppercase
Characters, Minimum Digit Characters, and Minimum Special
Characters. If Check For Dictionary Words in Password is enabled, the
Minimum Password Length value must be 6 or more.
Minimum Lowercase Characters This parameter specifies the minimum number of lowercase characters
(a–z) that the password must contain.
The range of values allowed is 0-10. Default: 2
Minimum Uppercase Characters This parameter specifies the minimum number of uppercase characters
(A–Z) that the password must contain.
The range of values allowed is 0-10. Default: 2
Minimum Digits This parameter specifies the minimum number of digit characters (0–9)
that the password must contain.
The range of values allowed is 0-10. Default: 2
Minimum Special Characters This parameter specifies the minimum number of special characters
that the password must contain. Special Characters are: !#$%*. @ - _
{}& ‘ ^ ? ! ( ) , / \ : ; ~ = +.
The range of values allowed is 0-10. Default: 0
Maximum Consecutive Characters This parameter specifies the maximum number of times a given
character can appear consecutively in a valid password. Configure the
value to 0 (zero) to disable Maximum Consecutive Characters.
The range of values allowed is 0-10. Default: 0
Minimum Characters Different This parameter specifies the minimum number of characters by which
from Previous Password the new password must differ from the previous password. The system
ignores this value if either one half of the characters in the new
password are different, or if there are more than 23 characters in the
new password.
The range of values allowed is 0-10. Default: 0
Password History This parameter specifies the size of the password history maintained
by the system for each user. The system rejects the reuse of any
password found in the user's history. To disable password history
validation, set this value to 0 (zero).
The range of values allowed is 0-24. Default: 1
User ID or Reversed User ID Select this check box if you want to allow the password to include the
Permitted in Password user's ID or the user's ID reversed.
Table continues…
Parameter Description
Check for Dictionary Words in Select this check box if you want to prevent administrators from using
Password passwords that are derived from dictionary words. When this setting is
enabled, the system checks whether dictionary words are used in the
password.
Name Description
Maximum Password Life (days) This parameter specifies the maximum number of days that an
administrator’s password can be used before it expires. After the
specified number of days, the administrator must change the password
to access the server. To disable password expiration, set this value to 0
(zero).
The range of values allowed is 0-180 days. Default: 90
Minimum Password Life (hours) This parameter specifies the minimum number of hours between
password changes.This setting discourages administrators from
immediately changing their passwords back to a previously used
password (password flipping). To permit users to change their
passwords as often as they want, set this value to 0 (zero). If not set to
0, the minimum password life must be less than the maximum
password life.
The range of values allowed is 0-480 hours (20 days). Default: 1
Expiry Notification (days) This parameter specifies the number of days in advance that users
receive a warning that their passwords will expire. To disable expiry
notification, set this value to 0 (zero). If not set to 0, the expiry
notification must be less than the maximum password life and greater
than the minimum password life.
The range of values allowed is 0-30 days. Default: 7
When editing a local administrator account, the security administrator can override the Maximum
Password Life value, and thereby apply a different maximum life to an administrator's password.
separately for the Element Manager Console—Open Management Interface (OMI) and the
Provisioning Client, by using Element Manager Console.
Note:
These log on session constraints do no apply to single signon account sessions via Avaya
Aura® System Manager.
Configure the following parameters for local administrator account log on sessions:
• Session Timeout: This rule defines the maximum number of minutes a session can be idle
before an administrator must reauthenticate. The range of values for this parameter is 0-120.
Configure the value to 0 (zero) to disable session timeout. You cannot disable session timeout
for the Avaya Aura Provisioning Client. For Configuration Management clients (which include
Element Manager Console), after a session times out, any write or maintenance operations
require reauthentication; read operations continue to function normally.
• Failed Login Attempts before Lockout: This rule defines the maximum number of successive
failed attempts to log on, allowed before the system locks the administrator's account. The
range of values for this parameter is 0-10. Configure the value to 0 (zero) to disable lockout
and to allow an unlimited number of successive failed login attempts. A value other than zero
represents an inclusive number of attempts. Therefore, if the value is 1 (one), a single failure
causes the administrator's account to become immediately locked. The system rejects further
login attempts until the lockout duration expires.
• Lockout Duration: This rule defines the number of minutes that an administrator's account
remains locked after reaching the maximum number of successive failed login attempts. The
range of values for this parameter is 1-60.
Verification reports
After verification, fcheck reports findings of changes to the monitored files and directories, to
standard out (STDOUT). The tool reports file and directory changes by using the keyword stat on file
or dir. The tool checks the following file and directory attributes for changes: Inode number,
permission, file size, time of last status change, file UID, file GID, and file CRC hash.
Configuration file
The fcheck configuration file is located at /opt/mcp/fcheck. The fcheck tool uses the following
configuration attributes to specify the files and directories to be monitored:
• Directory: specifies that the directory that need to be monitored. The forward slash (/) at the
end of the directory indicates recursive directory monitoring.
• Exclusion: to exclude directories and files that are not intended for monitoring, such as log files
that are known to change frequently on an ongoing basis.
Important:
Use the configuration file only for troubleshooting purposes.
Application logging
After you harden the Avaya Aura® Conferencing application logging, the system writes network
element (NE) logs to the following directories on the servers hosting the Element Manager Console
NEs:
• non security logs: /var/mcp/oss/log/EM/nonSecurity
• security logs: /var/mcp/oss/seclog/EM/security
The non security related logs can be viewed by users in the AA role. The secure logs can only be
viewed by users in the SSA or SA roles.
Important:
You must remove these logs after you undeploy the network element instance.
In addition to the NE logs, the Element Manager Console and Provisioning Manager NEs also write
access logs to the platform.
The Element Manager Console writes logs to the /var/mcp/run/<MCP version>/<EM_NEI_name>/
tomcat/logs/ directory. The <EM_NEI_name> is the instance name of the Element Manager Console
on that server. For example EM1_0 denotes the primary Element Manager Console instance.
The Provisioning Manager writes logs to the /var/mcp/run/<MCP version>/<Prov_NEI_name>/
tomcat/log/ directory. The <Prov_NEI_name> is the instance name of the Provisioning Manager on
that server. For example PROV1_0 denotes the primary Provisioning Manager instance.
After enabling web server logs, the system writes the logs to the NE application logs. These logs are
found in /var/mcp/oss/log/EM/all/MCP/<NE> on the Avaya Aura® Conferencing application server.
Security logs
This section contains information about security logs.
Syslog
The system stores syslogs and security-related syslogs in the var/log directory. Administrators who
have the role of SA or SSA can view syslogs. Only the root user can delete syslogs from the
system. However, the SA can force the logs to rotate by using the logrotate command.
By default, syslogs rotate daily and store up to 15 days worth of logs. After 15 days, the system
deletes the oldest log on a daily basis. Avaya recommends that you transfer the logs from the server
within 15 days, to prevent the loss of any log files after file rotation.
You can also configure the system to send syslogs to a syslog server. This configuration typically
occurs during system installation, but the SSA can choose to configure this at run time by issuing
the reconfigure script. You must configure the remote syslog server as a trusted node, if an ACL
firewall is configured on the system.
System audit
Avaya Aura® Conferencing generates audit logs to monitor administrator behavior. Only Security
Auditor (SA) or System Security Administrator (SSA) can view these logs. The audit logs contain the
following data:
• Time and date of action
• User ID and PID of action
• Command issued
• Success or fail status
• Object changed
• Terminal type
• Exit code
Avaya Aura® Conferencing stores the audit logs at /var/log/audit. By default, the logs rotate
daily, and Avaya Aura® Conferencing stores the logs for a maximum of 15 days. SSA or SA can
force the audit logs to rotate using the logrotate command. Only the root user or SSA can delete
audit logs.
If Avaya Aura® Conferencing cannot write to the audit log, Avaya Aura® Conferencing sends a failure
message to syslog.
When the free disk space in the partition is less than 750 MB, Avaya Aura® Conferencing sends a
warning message to syslog. When the free disk space is less than 250 MB, Avaya Aura®
Conferencing sends another message to syslog to indicate that the disk is full and logging might
stop. If the disk partition is full, back up the logs, log in with root-level access, and delete the logs.
To view the current audit rules, on the Avaya Aura® Conferencing core server or Avaya Media
Server, log in as SSA, and open the /etc/audit/audit.rules. The rules are specific to either
the Avaya Aura® Conferencing core server or Avaya Media Server, so different servers display
different sets of rules.
Warning:
Do not change the audit rules file. If you change the file, auditing might stop.
Typically, system audit configuration occurs during initial installation. SSA can configure audit log
settings using the configAudit command. You can also configure audit log settings by running
the reconfigure script. If you change the audit log configuration, restart the system.
SSA or SA can use the following tools to view audit logs:
• aureport: Get a summarized report on audit logs.
• ausearch: Search for patterns in audit logs. For example, use --help for instructions.
SSA or SA roles can also view the audit logs using vi and grep.
Audit logs can be archived and transferred to another server for archiving or filtering. Avaya Aura®
Conferencing does not delete the audit logs on the server, but transfers a copy of the logs. You must
be a root user to delete logs and free disk space.
For more information, see Administering Avaya Aura® Conferencing.
Related links
File activity in restricted areas on page 45
Failed logons
To view failed log on attempts, use the grep command for the audit log files and search for the
words "authentication" and "failed". The following example shows a failed login from the server
command line:
> grep authentication /var/log/audit/* | grep failed
/var/log/audit/audit.log:type=USER_AUTH
msg=audit(1273507587.172:8886): user pid=3739 uid=0 auid=4294967295
msg='PAM: authentication acct="ntsysadm" : exe="/usr/sbin/sshd"
(hostname=192.168.1.10, addr=192.168.1.10, terminal=ssh res=failed)'
In this example, joebobssa tries to write to the /opt/mcp/java directory. The administrator with
the 20233 user ID types the touch command on the file /opt/mcp/java/myfile.xml and fails.
The following fields describe the information in this example:
• uid: The administrator joebobssa with the 20233 user ID
• exe: The touch command that the administrator runs
• name: The name and path of the file
• success: The result of the command
Related links
System audit on page 43
Use the procedures in this chapter to manage passwords for the database.
Procedure
1. Log on to the server that hosts the primary Avaya Aura® Conferencing Element Manager
(Instance 0), as a user with SSA role.
2. Enter the command to change the password:
chgDbSchemaUserPasswd
3. If a password prompt appears, enter the password for the SSA account.
4. At the prompt, confirm that you want to change the password.
A message appears to report the success or failure of the password change.
3. If a password prompt appears, enter the password for the SSA account.
4. At the prompt, confirm that you want to change the password.
A message appears to report the success or failure of the password change.
5. Apply the Maintenance Release or patch upgrade.
Important:
If any network element is not upgraded and is therefore still running the old load, an
error message appears. To complete the procedure, repeat Step 5 for the affected
network elements.
Use the procedures in this chapter to verify file system integrity (FSI) and to manage FSI baselines.
This chapter describes the procedures to configure and manage administrator security for Avaya
Aura® Conferencing applications.
Related links
Application local administrator account security on page 34
Name Description
Minimum Lowercase Characters This parameter specifies the minimum number of lowercase characters
(a–z) that the password must contain.
The range of values allowed is 0-10. Default: 2
Minimum Uppercase Characters This parameter specifies the minimum number of uppercase characters
(A–Z) that the password must contain.
The range of values allowed is 0-10. Default: 2
Minimum Digits This parameter specifies the minimum number of digit characters (0–9)
that the password must contain.
The range of values allowed is 0-10. Default: 2
Minimum Special Characters This parameter specifies the minimum number of special characters
that the password must contain. Special Characters are: !#$%*. @ - _
{}& ‘ ^ ? ! ( ) , / \ : ; ~ = +.
The range of values allowed is 0-10. Default: 0
Maximum Consecutive Characters This parameter specifies the maximum number of times a given
character can appear consecutively in a valid password. Configure the
value to 0 (zero) to disable Maximum Consecutive Characters.
The range of values allowed is 0-10. Default: 0
Minimum Characters Different This parameter specifies the minimum number of characters by which
from Previous Password the new password must differ from the previous password. The system
ignores this value if either one half of the characters in the new
password are different, or if there are more than 23 characters in the
new password.
The range of values allowed is 0-10. Default: 0
Password History This parameter specifies the size of the password history maintained
by the system for each user. The system rejects the reuse of any
password found in the user's history. To disable password history
validation, set this value to 0 (zero).
The range of values allowed is 0-24. Default: 1
User ID or Reversed User ID Select this check box if you want to allow the password to include the
Permitted in Password user's ID or the user's ID reversed.
Check for Dictionary Words in Select this check box if you want to prevent administrators from using
Password passwords that are derived from dictionary words. When this setting is
enabled, the system checks whether dictionary words are used in the
password.
Password Aging Rules area
Maximum Password Life (days) This parameter specifies the maximum number of days that an
administrator’s password can be used before it expires. After the
specified number of days, the administrator must change the password
to access the server. To disable password expiration, set this value to 0
(zero).
Table continues…
Name Description
The range of values allowed is 0-180 days. Default: 90
Minimum Password Life (hours) This parameter specifies the minimum number of hours between
password changes.This setting discourages administrators from
immediately changing their passwords back to a previously used
password (password flipping). To permit users to change their
passwords as often as they want, set this value to 0 (zero). If not set to
0, the minimum password life must be less than the maximum
password life.
The range of values allowed is 0-480 hours (20 days). Default: 1
Expiry Notification (days) This parameter specifies the number of days in advance that users
receive a warning that their passwords will expire. To disable expiry
notification, set this value to 0 (zero). If not set to 0, the expiry
notification must be less than the maximum password life and greater
than the minimum password life.
The range of values allowed is 0-30 days. Default: 7
cd /var/mcp/install
5. Run the script to restart the Element Manager:
./emUpgrade.pl
This script stops all Element Manager instances, redeploys the load specified in
installprops.txt, and restarts all Element Manager instances.
6. Log on Element Manager Console with the admin account.
7. Type the password, which was reset by the resetEMGuiAdminPasswd.pl script to admin.
8. At the prompt to change the password, type a new password that complies with the
password rules.
9. Type the new password again to confirm.
10. Click OK to save the new password and complete the log on.
The Access Control List (ACL) configuration includes configuring the internal ACL rules and external
ACL rules. The system uses the internal rules to apply to connections. Generate these rules by
running the mcpGenIntACLconfig.pl program that creates the rules based on the configuration
data in the Avaya Aura® Conferencing database. The external rules apply to restricting external
access from ancillary devices to Avaya Aura® Conferencing. Configure the external rules manually.
Complete all tasks in Configuring internal ACL rules and Configuring external ACL rules to complete
the ACL configuration. Avaya Aura® Conferencing applies the internal ACL rules only after you
configure and commit the external ACL rules.
Note:
If you receive an error message that the remote host identification has changed, see
Deploying Avaya Aura® Conferencing to fix the problem. Once you fix the keys, retry the
script on this server.
8. Repeat Steps 1 through 7 on all remaining servers in the system.
Note:
The internal ACL rules are applied to the system only after you commit the ACL rules via
the iptcfg tool. See Importing an external Access Control List configuration file on
page 65.
Procedure
1. If the Avaya Media Server is deployed on the target server, prepare the Avaya Media Server.
See Preparing the Avaya Media Server on page 65.
2. Perform one of the following steps:
• Create a configuration file and then import it using the iptcfg tool. See Importing an
external ACL configuration file on page 65.
• Configure the rules manually using the iptcfg tool. See Configuring external ACL rules
manually (using the iptcfg tool) on page 67.
3. Verify the ACL configuration. See Verifying the ACL configuration on page 70.
Avaya Media Server file has additional syntax. Refer to the appropriate example of the configuration
files for each server. Log in as a root user and view examples of:
• The Avaya Media Server configuration file at /opt/mcp/ipt/example on Avaya Media
Server.
• The Element Manager server configuration file, with instructions on how to configure the file,
at /opt/mcp/ipt/example on the Avaya Aura® Conferencing server.
You might need to configure the following external trusted nodes in the configuration file:
• Remote syslog server
• Remote NTP server
• Administrator computer
• DNS
Perform this procedure on all servers in the Avaya Aura® Conferencing system.
Procedure
1. Log on to the server as SSA.
2. At the prompt, enter su -, and press Enter.
3. At the password prompt, enter the root password, and press Enter.
4. Create an ACL configuration file based on the configuration file examples.
Ensure that the trusted nodes listed in the configuration file contain the IP address of your
computer. If your computer is not configured as a trusted node, you cannot access the server
after you configure and commit the ACL rules because applying the rules will block access to
the server.
5. To revert to the login as SSA, type exit, and press Enter.
6. After you create the ACL configuration file, type iptcfg, and press Enter.
The system displays the IPTables Configurations Options menu.
7. At the prompt Selection [1 to 9], enter 4 to select Import Configurations, and press
Enter.
The system displays a warning that the operation changes the IPTables rules.
8. At the prompt Proceed (Y or N), enter y and press Enter.
9. At the prompt Import file name (full path), enter the file path and the configuration
file name of the server, and press Enter.
The system displays the following warning:
WARNING: Trusted nodes must include those from which the user logs
into the current server to perform the maintenance tasks. If you
have not specified them as trusted nodes in the import file, you
will not be able to log in to the server again after the importing
has completed.
Note:
The list of trusted nodes is not added to the IPTables rules yet. The changes will be
committed to the IPTables rules after you complete this procedure.
7. At the prompt Selection [1 to 9], enter 2 to select Configure Trusted Ports, and
press Enter.
The Trusted Port Configuration Options menu appears.
8. Perform the following steps for each trusted port you want to be enabled on the server:
a. At the prompt Selection [1 to 4], enter 1 to select List all trusted port
configuration, and press Enter.
The list of all trusted port configurations is displayed.
b. At the prompt Selection [1 to 4], enter 2 to select Modify a trusted port
configuration, and press Enter.
c. At the prompt Enter ID of trusted port configuration to be modified,
enter the ID of the port you want to modify (from the list of all trusted port configuration),
and press Enter.
d. Press Enter to confirm your action.
e. At the prompt Enter port status, enter 1 to enable the port or enter 0 to disable
the port.
f. Press Enter.
g. Press Enter to confirm your change.
h. Repeat Steps A through G for each trusted port you want to enable on the server.
9. At the prompt Selection [1 to 4] for the Trusted Port Configuration Options menu,
enter 3 to select Return to main menu, and press Enter.
10. Enter y and press Enter to confirm your action.
The IPTables Configurations Options menu appears.
Note:
The list of trusted ports is not added to the IPTables rules yet. The changes will be
committed to the IPTables rules after you complete this procedure.
11. At the prompt Selection [1 to 9], enter 3 to select DSCP Marking, and press Enter.
The DSCP Marking Configuration Options menu appears.
12. Perform the following steps for each DSCP value you want to configure on the server:
a. At the prompt Selection [1 to 4], enter 1 to select Show DSCP marking
configuration, and press Enter.
The DSCP marking configuration is displayed.
b. At the prompt Selection [1 to 4], enter 2 to select Modify DSCP values, and
press Enter.
c. At the prompt Enter ID of the DSCP category to be modified, enter the ID
of the DSCP value you want to modify (displayed in the DSCP marking configuration),
and press Enter.
d. Enter the DSCP value and press Enter.
e. Press Enter to confirm your change.
f. Repeat Steps A through E for each DSCP value you want to configure on the server.
13. At the prompt Selection [1 to 4] for the DSCP Marking Configuration Options menu,
enter 3 to select Modify DSCP marking status, and press Enter.
14. Enter 1 to enable the DSCP marking status or enter 0 to disable it.
15. Press Enter.
16. Press Enter to confirm your change.
17. At the prompt Selection [1 to 5] for the DSCP Marking Configuration Options menu,
enter 4 to select Return to main menu, and press Enter.
18. Enter y and press Enter to confirm your action.
The IPTables Configurations Options menu appears.
Note:
The DSCP configuration changes are not added to the IPTables rules yet. The changes
will be committed to the IPTables rules after you complete this procedure.
19. At the prompt Selection [1 to 9], enter 5 to select Commit IPTables Rules, and press
Enter.
20. At the prompt Proceed (Y or N), enter y and press Enter.
The following warning appears:
WARNING: Trusted nodes must include those from which the user logs
into the current server to perform the maintenance tasks. If you
have not configured these as trusted nodes, you will not be able to
log in to the server again after the configuration changes are
committed.
21. At the prompt Proceed (Y or N), enter y and press Enter.
22. Restart the Web Conference Server (WCS) network element.
This is an important step. If you do not restart the WCS, the WCS will not operate correctly
and users will not be able to start or join a Web collaboration.
Example of import.dat
The rules for an external Access Control List (ACL) configuration file are at /opt/mcp/ipt/
example/import.dat. Follow the instructions in the example file to configure an ACL file.
The following example of the import.dat configuration file applies to Element Manager servers in
Small to Medium and Medium layouts:
trusted node 192.168.209.241 192.168.209.22
trusted node 192.168.209.241 192.168.209.10
trusted node 192.168.209.241 192.168.209.20
trusted node 192.168.209.241 192.168.209.13
siptcpport 5060 0
siptcptlsport 5061 1
httpport 80 1
httpsport 443 1
wcshttp 8140 0
wcshttps 8141 0
wcsflashpolicy 8142 0
dscpenabled false
dscpvalue 1 48
dscpvalue 2 18
dscpvalue 3 16
mediaports 6000 42599 1
The TLS mutual authentication mode requires that both the server endpoint and the client endpoint
exchange X.509 certificates for authentication. Interfaces between network elements continue to
enforce TLS mutual authentication as the mandatory setting.
Avaya Aura® Conferencing supports user devices used only as administrator computers for TLS
mutual authentication.
Procedure
1. Log in to Element Manager Console.
2. In the navigation pane of Element Manager Console, click Feature Server Elements >
Element Manager > Element Manager > Configuration Parameters.
3. In the Element Manager Configuration Parameters window, from the Parm Group field,
select TLSAuth.
4. Click EnforceTLSMutualAuthForHTTPS, and click Edit (-/+).
5. In the Edit Element Manager - TLSAuth Config Parm dialog box, from the Value box, select
true.
6. Click Apply.
7. Close the Element Manager Configuration Parameters window.
8. Restart the standby Element Manager instance.
9. After the standby instance of Element Manager instance moves to the hot standby state,
stop the active Element Manager instance.
Element Manager fails over to the backup instance. Element Manager Console loses
connectivity during the failover.
10. Log in to Element Manager Console again.
11. Start the Element Manager backup instance.
5. Restart the following network elements to apply the changes: PROV, WCS, DCS and EM.
T
timers ................................................................................... 16