vStor 4.11
Catalogic SoftwareKnowledge BaseMySupport
  • Welcome to vStor!
  • Introduction
  • Installation
    • Deploying Catalogic vStor on Physical Appliances
    • Deploying Catalogic vStor Virtual Appliance for VMware
    • Deploying Catalogic vStor Virtual Appliance for Microsoft Hyper-V
    • Required Ports for Catalogic vStor
    • Updating Catalogic vStor
  • Quick Start
    • Catalogic vStor for VMware
    • Catalogic vStor for Hyper-V
  • Basic Configuration
    • Initializing vStor
    • Adding Catalogic vStor Node to Catalogic DPX
      • Using vStor API Keys with Catalogic DPX
    • Configuring vStor System Settings
      • Basic System Configuration
      • Security and Network
      • Data Management and Optimization
      • System Monitoring and Maintenance
    • Configuring Network Settings of Catalogic vStor
    • Backing up Configuration Settings of Catalogic vStor
    • Restoring Configuration Settings of Catalogic vStor
  • Storage Management
    • Adding Disks
    • Managing Storage Pools
    • Managing Volumes
      • Migrating Volumes
      • Creating Volume Snapshots
      • Using vStor Autosnapshot
    • ZFS Compression and Deduplication
    • Managing Shares
    • Managing Hosts for LUN Volumes
    • Using vStor Snapshot Explorer
  • Data Protection
    • Catalogic vStor Backup and Recovery
    • Creating vStor Partnerships
      • Creating Replication Groups
      • Establishing Cross-Version Partnerships
    • Enabling Volume Encryption
    • Immutability in vStor
    • Using GuardMode Scan
  • Advanced Configuration
    • Using Multipath Storage
    • Managing Certificates
    • Adding Encryption URLs
    • Managing MinIO Buckets
    • Assigning an E-mail to a vStor Account
    • Managing vStor User Accounts
    • Using Multi-factor Authentication (MFA)
  • vStor Command Line Interface
    • Catalogic vStor Server CLI Overview
  • Best Practices
    • Hardware Configurations: Best Practices
    • Data Backup: Best Practices
    • Data Archiving: Best Practices
    • Backup Storage: Best Practices
    • Frequently Asked Questions: Best Practices
Powered by GitBook
On this page
  • Firewall
  • Certificates
  • Encryption Keystore
  • User
  • Passwords
  • Host
  • Port
  • Path
  1. Basic Configuration
  2. Configuring vStor System Settings

Security and Network

PreviousBasic System ConfigurationNextData Management and Optimization

Last updated 7 months ago

This chapter focuses on settings that enhance the security of your vStor system and control its network behavior. These settings are essential for protecting your data and managing system access.

Firewall

Enable or disable the vStor firewall by selecting an appropriate option from the dropdown menu.

Certificates

This section allows you to manage certificates in Catalogic vStor.

See also. For more details on certificates, see .

Encryption Keystore

Specify the location of your encryption keystore:

User

The username to access the encryption keystore.

Passwords

The password to access the encryption keystore.

Host

The hostname or IP address where the keystore is located.

Port

The port on which the keystore service listens.

Path

The file path to the encryption keystore.

Certificates in Catalogic vStor