vStor 4.10
Catalogic SoftwareKnowledge BaseMySupport
  • Welcome to vStor!
  • Introduction
  • Installation
    • Deploying Catalogic vStor on Physical Appliances
    • Deploying Catalogic vStor Virtual Appliance for VMware
    • Deploying Catalogic vStor Virtual Appliance for Microsoft Hyper-V
    • Required Ports for Catalogic vStor
    • Updating Catalogic vStor
  • Quick Start
    • Catalogic vStor for VMware
    • Catalogic vStor for Hyper-V
  • Basic Configuration
    • Initializing vStor
    • Adding Catalogic vStor Node to Catalogic DPX
      • Using vStor API Keys with Catalogic DPX
    • Configuring vStor System Settings
      • Basic System Configuration
      • Security and Network
      • Data Management and Optimization
      • System Monitoring and Maintenance
    • Configuring Network Settings of Catalogic vStor
    • Backing up Configuration Settings of Catalogic vStor
    • Restoring Configuration Settings of Catalogic vStor
  • Storage Management
    • Adding Disks to Catalogic vStor
    • Managing Storage Pools in Catalogic vStor
    • Managing Volumes in Catalogic vStor
      • Migrating Volumes in Catalogic vStor
    • Managing Shares in Catalogic vStor
    • Managing Hosts for LUN Volumes in Catalogic vStor
  • Data Protection
    • Catalogic vStor Backup and Recovery
    • Creating vStor Partnerships
      • Creating Replication Groups
    • Enabling Volume Encryption
  • Advanced Configuration
    • Using Multipath Storage for Catalogic vStor
    • Certificates in Catalogic vStor
    • Adding Encryption URLs to Catalogic vStor
    • MinIO Buckets in Catalogic vStor
    • Assigning an E-mail to the vStor Account
    • Managing vStor User Accounts
    • Using Multi-factor Authentication (MFA) in vStor
  • vStor Command Line Interface
    • Catalogic vStor Server CLI Overview
  • Best Practices
    • Hardware Configurations: Best Practices
    • Data Backup: Best Practices
    • Data Archiving: Best Practices
    • Backup Storage: Best Practices
    • Frequently Asked Questions: Best Practices
Powered by GitBook
On this page
  • Firewall
  • Certificates
  • Encryption Keystore
  • User
  • Passwords
  • Host
  • Port
  • Path
  1. Basic Configuration
  2. Configuring vStor System Settings

Security and Network

PreviousBasic System ConfigurationNextData Management and Optimization

Last updated 7 months ago

This chapter focuses on settings that enhance the security of your vStor system and control its network behavior. These settings are essential for protecting your data and managing system access.

Firewall

Enable or disable the vStor firewall by selecting an appropriate option from the dropdown menu.

Certificates

This section allows you to manage certificates in Catalogic vStor.

See also. For more details on certificates, see .

Encryption Keystore

Specify the location of your encryption keystore:

User

The username to access the encryption keystore.

Passwords

The password to access the encryption keystore.

Host

The hostname or IP address where the keystore is located.

Port

The port on which the keystore service listens.

Path

The file path to the encryption keystore.

Certificates in Catalogic vStor