Skip to main content
NetApp Knowledge Base

How to configure an AltaVault Access Control List (ACL)

Views:
70
Visibility:
Public
Votes:
0
Category:
altavault
Specialty:
legacy
Last Updated:

Applies to

  • AltaVault
  • Access Control List (ACL)

Description

You can secure access to the AltaVault using an internal management Access Control List

  • Using an internal management ACL, you can:
    • restrict access to certain interfaces or protocols of an appliance
    • restrict inbound IP access to the AltaVault, protecting it from access by hosts that do not have permission
    • specify which hosts or groups of hosts can access and manage the AltaVault by IP address
  • The Management ACL provides the following safeguards to prevent accidental disconnection from the AltaVault:
    • It detects the IP address you are connecting from and displays a warning if you add a rule that denies connections to that address
    • It converts well-known port and protocol combinations such as SSH, Telnet, HTTP, HTTPS, SNMP, and SOAP into their default management service and protects these services from disconnection. For example, if you specify protocol 6 (TCP) and port 22, the management ACL converts this port and protocol combination into SSH and protects it from denial
    • It also tracks changes to default service ports and automatically updates any references to changed ports in the access rules

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.

 

  • Was this article helpful?