Security and Network
Last updated
Last updated
This chapter focuses on settings that enhance the security of your vStor system and control its network behavior. These settings are essential for protecting your data and managing system access.
Enable or disable the vStor firewall by selecting an appropriate option from the dropdown menu.
This section allows you to manage certificates in Catalogic vStor.
See also. For more details on certificates, see Certificates in Catalogic vStor.
Encryption Keystore is a remote location where encryption keys for vStor volumes are stored. The recommended location for the Encryption Keystore is the DPX Master Server, although all Linux machines are supported.
When configuring the Encryption Keystore in vStor, the user specifies an existing remote location for the keystore and credentials for the user with writing access to the specified directory.
To configure Encryption Keystore, follow the procedure below:
Navigate to the Encryption Keystore pane and select Edit. The Encryption Keystore dialog will open.
Populate the dialog according to the indications below.
User
The Linux user with writing access to the keystore’s directory.
Password
The Linux user’s password.
Host
The hostname or IP address of the machine where the keystore is located.
Port
The port on which the machine with keystore listens.
Path
An existing absolute directory to be used as the Encryption Keystore. The path must be in Linux format.
Click Test to verify the keystore accessibility.
Click Save. The configuration is now saved.
See more. To learn more about storing and managing encryption passwords, see Using Remote Keystore.