<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DISA STIG: DoD-Approved PKI in ONTAP Discussions</title>
    <link>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450505#M43192</link>
    <description>&lt;P&gt;That would like be an approved Linux or windows box capable of running the command. You don’t need to run the “security certificate generate-csr” on the Netapp. You can do it off box b you just need to be sure to keep the public and private keys&lt;/P&gt;</description>
    <pubDate>Mon, 29 Jan 2024 21:19:52 GMT</pubDate>
    <dc:creator>TMACMD</dc:creator>
    <dc:date>2024-01-29T21:19:52Z</dc:date>
    <item>
      <title>DISA STIG: DoD-Approved PKI</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450413#M43172</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am currently in the process of implementing the DISA STIG on our six NetApps. Four of these are AFF-A220's (running NFS for vCenter datastores) and reside on a completely private network and are not domain facing, and we utilize a local admin account to manage. We figure these could be exempted from this item. We have two other newer AFF-A150's which are running CIFS/SMB for our network shares. These are partially domain facing, however our management IP's reside on that private network, where we manage via jumpserver. We figure these should get DoD certificates. Two questions on this process:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;We were told by our professional services rep that helped us install the AFF-A150's that we should be able to utilize domain authentication since the CIFS Data LIFS are domain facing and have domain IP's, despite our management IP's residing on a private network. Any confirmation of this and how this could be set up?&lt;/LI&gt;&lt;LI&gt;Main question is in regards to the actual CLI commands. The STIG references the following command for creating a CSR "&lt;EM&gt;request security generate-certificate-request certificate-id &amp;lt;cert_name_from_key_file&amp;gt; digest &amp;lt;sha1 | sha256&amp;gt; domain &amp;lt;FQDN&amp;gt; email &amp;lt;admin_email&amp;gt; ip-address &amp;lt;ip_address&amp;gt; subject “CN=&amp;lt;hostname&amp;gt;,DC=&amp;lt;domain_part&amp;gt;,DC=&amp;lt;TLD_domain&amp;gt;,O=&amp;lt;organization&amp;gt;,OU=&amp;lt;organization_dept&amp;gt;,&amp;nbsp;L=&amp;lt;city&amp;gt;,ST=&amp;lt;state&amp;gt;,C=&amp;lt;us&amp;gt;” filename &amp;lt;path/filename&amp;gt;&amp;nbsp;&lt;/EM&gt;" however&amp;nbsp;&lt;A href="https://docs.netapp.com/us-en/ontap/system-admin/generate-certificate-signing-request-cluster-task.html" target="_blank" rel="noopener"&gt;this ONTAP doc&lt;/A&gt;&amp;nbsp;has a completely different command listed, called "&lt;EM&gt;security certificate generate-csr&lt;/EM&gt;".&amp;nbsp;I am familiar with the process of getting a DoD cert once I have the CSR, but I'm unsure which command generates the correct one.&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Wed, 04 Jun 2025 09:42:02 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450413#M43172</guid>
      <dc:creator>NetApp93</dc:creator>
      <dc:date>2025-06-04T09:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: DISA STIG: DoD-Approved PKI</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450429#M43178</link>
      <description>&lt;P&gt;I will answer #2 first. The "request security..." command is NOT an ONTAP command. They are directing you to go create the CSR that has DOD-approved PKI methods. The rule is -&amp;gt; &lt;SPAN&gt;SV-246945r878000 -&amp;gt;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;ONTAP must use DoD-approved PKI rather than proprietary or self-signed device certificates&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;They are expecting you to use an authorized device to create the CSR. You use the resulting information to install the Cert into ONTAP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;#1. If your CIFS vserver has joined the domain, that is the most difficult part. However, for added security, you should have a dedicated SVM for establishing what ONTAP calls a Domain-Tunnel. This allows the admin vserver to tunnel AUTH requests to another vserver for domain authentication. I have instead been creating a more-secure method. I use a lesser known item in ONTAP called active-directory (svm). I typically do something like this:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;FONT face="andale mono,times" size="1 2 3 4 5 6 7"&gt;vserver create -vserver auth -rootvolume-security-style ntfs -data-services management-ad-client&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="andale mono,times" size="1 2 3 4 5 6 7"&gt;net int create -vserver auth -lif auth -service-policy default-management -address 192.168.0.201 -netmask-length 24 -home-node cluster1-01 -home-port e0c -status-admin up -failover-policy broadcast-domain-wide -auto-revert true&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="andale mono,times" size="1 2 3 4 5 6 7"&gt;route create -vserver auth&amp;nbsp; -destination 0.0.0.0/0 -gateway 192.168.0.1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="andale mono,times" size="1 2 3 4 5 6 7"&gt;dns create -vserver auth -domains demo.netapp.com -name-servers 192.168.0.253&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="andale mono,times" size="1 2 3 4 5 6 7"&gt;vserver cifs security modify -vserver auth -is-aes-encryption-enabled true -lm-compatibility-level ntlmv2-krb -session-security-for-ad-ldap sign -smb1-enabled-for-dc-connections false -smb2-enabled-for-dc-connections true&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="andale mono,times" size="1 2 3 4 5 6 7"&gt;vserver active-directory create -vserver auth -account-name auth -domain demo.netapp.com -ou CN=Computers&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="andale mono,times" size="1 2 3 4 5 6 7"&gt;security login domain-tunnel create -vserver auth&lt;BR /&gt;security login create -user-or-group-name DEMO\tmac -authentication-method domain -application ssh&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="andale mono,times" size="1 2 3 4 5 6 7"&gt;security login create -user-or-group-name DEMO\tmac -authentication-method domain -application ontapi&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="andale mono,times" size="1 2 3 4 5 6 7"&gt;security login create -user-or-group-name DEMO\tmac -authentication-method domain -application http&lt;BR /&gt;&lt;/FONT&gt;&lt;/PRE&gt;&lt;P&gt;When creating the LIF, you can give it any IP and any port that it needs to communicate with the DCs.&lt;/P&gt;&lt;P&gt;This allows the user tmac in the DEMO domain to login as DEMO\tmac or even via SSH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 01:49:44 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450429#M43178</guid>
      <dc:creator>TMACMD</dc:creator>
      <dc:date>2024-01-25T01:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: DISA STIG: DoD-Approved PKI</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450502#M43190</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.netapp.com/t5/user/viewprofilepage/user-id/65619"&gt;@TMACMD&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I will answer #2 first. The "request security..." command is NOT an ONTAP command. They are directing you to go create the CSR that has DOD-approved PKI methods. The rule is -&amp;gt; &lt;SPAN&gt;SV-246945r878000 -&amp;gt;&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;ONTAP must use DoD-approved PKI rather than proprietary or self-signed device certificates&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;They are expecting you to use an authorized device to create the CSR. You use the resulting information to install the Cert into ONTAP.&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;What authorized device would create the CSR? The DoD uses the NPE Portal which you have to bring a CSR to request a cert with, it doesn't create the CSR for you. Wouldn't generating the CSR be done by the system needing the cert?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 19:17:04 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450502#M43190</guid>
      <dc:creator>NetApp93</dc:creator>
      <dc:date>2024-01-29T19:17:04Z</dc:date>
    </item>
    <item>
      <title>Re: DISA STIG: DoD-Approved PKI</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450505#M43192</link>
      <description>&lt;P&gt;That would like be an approved Linux or windows box capable of running the command. You don’t need to run the “security certificate generate-csr” on the Netapp. You can do it off box b you just need to be sure to keep the public and private keys&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2024 21:19:52 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450505#M43192</guid>
      <dc:creator>TMACMD</dc:creator>
      <dc:date>2024-01-29T21:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: DISA STIG: DoD-Approved PKI</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450517#M43194</link>
      <description>&lt;P&gt;Isn't the "security certificate generate-csr..." command an ONTAP CLI command? Wouldn't that only be able to be ran while using ONTAP CLI? Or do you mean having an SSH CLI session from a secure box?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 13:15:31 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450517#M43194</guid>
      <dc:creator>NetApp93</dc:creator>
      <dc:date>2024-01-30T13:15:31Z</dc:date>
    </item>
    <item>
      <title>Re: DISA STIG: DoD-Approved PKI</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450518#M43195</link>
      <description>&lt;P&gt;I am going to partially repeat my last response:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You don’t need to run the “security certificate generate-csr” on the Netapp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Insted, you can use (You will need to Look it up, I am not planning on doing that right now) a command on a Linux box in your PKI infrastructure to run a command that does as teh STIG says:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The STIG references the following command for creating a CSR "&lt;EM&gt;request security generate-certificate-request certificate-id &amp;lt;cert_name_from_key_file&amp;gt; digest &amp;lt;sha1 | sha256&amp;gt; domain &amp;lt;FQDN&amp;gt; email &amp;lt;admin_email&amp;gt; ip-address &amp;lt;ip_address&amp;gt; subject “CN=&amp;lt;hostname&amp;gt;,DC=&amp;lt;domain_part&amp;gt;,DC=&amp;lt;TLD_domain&amp;gt;,O=&amp;lt;organization&amp;gt;,OU=&amp;lt;organization_dept&amp;gt;,&amp;nbsp;L=&amp;lt;city&amp;gt;,ST=&amp;lt;state&amp;gt;,C=&amp;lt;us&amp;gt;” filename &amp;lt;path/filename&amp;gt;&amp;nbsp;&lt;/EM&gt;"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-&amp;gt; This is not run in any form or fashion ON or against the NetApp. AT ALL. This is a completely OFF-BOX command to generate the approved STIG csr for PKI. The result from the command will produce a private key and a CSR. You send the CSR back and then you will the public key. You then install the certificate into ONTAP and you will need the private key when the CSR was generated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 13:33:01 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/DISA-STIG-DoD-Approved-PKI/m-p/450518#M43195</guid>
      <dc:creator>TMACMD</dc:creator>
      <dc:date>2024-01-30T13:33:01Z</dc:date>
    </item>
  </channel>
</rss>

