Security Management for ECLI, NETCONF, and File Transfer Protocols

Contents

1Understanding Security Management for ECLI, NETCONF, and FTP
1.1Key Security Management Concepts
1.2ECLI, NETCONF, and FTP Server IP Address
1.3Session Parameters
1.4SSH Authentication
1.5TLS Authentication
1.6SSH and TLS Transport Protocol Security

2

Basic Security Management Operations

3

Configuration Management

1   Understanding Security Management forECLI, NETCONF, and FTP

1.1   Key Security Management Concepts

The System Management managed area is represented in the Managed Object Model (MOM) under the SysM Managed Object Class (MOC). For general information about the MOM, MOCs, cardinality, and related concepts, refer to Managed Object Model User Guide. An overview of Security Management is shown in Figure 1.

Figure 1   Security Management Overview

1.2   ECLI, NETCONF, and FTP Server IP Address

The IP address used for Operation and Maintenance (OAM) connections is defined at site deployment.

The The ECLI, NETCONF, and FTP listen on all network addresses that are configured on the OAM processor.

The default port numbers for the OAM protocols are described in Table 1.

Table 1    Port Numbers of OAM Protocols

Service Name

SSH Port

TLS Port

ECLI

22

6522

NETCONF

830

6513

FTP

-

21

The FTP over TLS port number is configurable in the MOM; see Section 2 Basic Security Management Operations.

Note:  
ECLI and NETCONF port numbers are not configurable in the MOM.

1.3   Session Parameters

Idle OAM sessions are timed out. The default time-out values are described in Table 2.

Table 2    Time-Out Value for Idle Sessions

Service Name

Time-out (Seconds)

ECLI

120

NETCONF(1)

300

FTP

3600

(1)  The timer is disabled for NETCONF notification sessions.


The FTP session idle time out is configurable in the MOM, see Section 2 Basic Security Management Operations.

Note:  
The ECLI and NETCONF timer values are not configurable in the MOM.

1.4   SSH Authentication

The SSH host key of the ECLI and NETCONF server is generated after installation.

The public key of the SSH key can be fetched from the filesystem by executing a serial console connection. The MOM does not support presenting the host key of the SSH server.

An ECLI or NETCONF SSH connection can be initiated and the presented fingerprint can be compared to the fingerprint of the public key copied from the node.

SSH requires the user to provide credentials at logon for user authentication. A valid account must exist and be accessible by the User Management function to authenticate the user identity successfully. The user credential can be either a password or a public key. For more information, refer to User Management.

SSH protocol supports periodical key re-exchange (RFC 4253).

1.5   TLS Authentication

A Transport Layer Security (TLS) connection requires the proper configuration of certificates by Certificate Management.

The server certificate for ECLI, NETCONF, or FTP access is enrolled by using Certificate Management; refer to Install Node Credential Online, Install or Renew Node Credential by CSR, and Install or Renew Node Credential by PKCS 12. If the certificate is enrolled, the CliTls or NetconfTls MO in SysM must be configured to use this credential.

For the authentication of client certificates, the ECLI, NETCONF, or FTP server needs at least one trusted certificate deployed by Certificate Management, and a configured trust category. If the trust category is prepared, the CliTls or NetconfTls MO in SysM must be configured to use this trust category.

In TLS case, the client certificate must contain an identity in the Subject Alternative Name (SAN) field of the client certificate for authorization. The value of the SAN should be one of the following:

If the SAN field is not present, the TLS connection closes.

A valid account must be present and accessible by the User Management function to authorize the user identity successfully. For more information, refer to User Management.

TLS protocol performs periodical renegotiation of cipher suites (RFC 5746) to ensure valid cipher parameters (such as keys and certificates) that are used during long TLS connections.

1.6   SSH and TLS Transport Protocol Security

Transport security level is defined by the actual security algorithms used for key exchange, message authentication, and encryption. The ME has a default algorithm set, which can be changed as described in SSH and TLS Protocol Management.

2   Basic Security Management Operations

System and security management of ECLI and NETCONF supports the following operations for an administrator with the System Administrator role.

Certificate management must be used to set up TLS for ECLI and NETCONF to deploy node credentials and trusted certificate categories.

Certificate Management

The administrative state of the ECLI and NETCONF transport protocols can be changed to lock unnecessary protocols and interfaces and to unlock the needed ones. SSH-based protocols are unlocked by default, TLS-based protocols can be unlocked after deploying certificates.

Administrative State

The listening server port numbers can be changed for some O&M services, for example, if needed for adaptation to security policies.

Port Numbers

The default session idle timer can be changed for some O&M services, for example, if needed for adaptations to firewall policies. A timer value of zero means that the connection waits indefinitely for activity over the connection, that is, it never times out.

Session Idle Timers

3   Configuration Management

System and security management for ECLI and NETCONF is accessed using NETCONF or the ECLI to manipulate the MIB.

The following operations, described in Operating Instructions using the ECLI, can be performed by an administrator with the System Security Administrator role:

Certificate Management

System Management



Copyright

© Ericsson AB 2017. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.

Disclaimer

The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.

Trademark List
All trademarks mentioned herein are the property of their respective owners. These are shown in the document Trademark Information.

    Security Management for ECLI, NETCONF, and File Transfer Protocols