How do I update the supported NFM-P TLS versions and ciphers?
Purpose
| 
 CAUTION Service Disruption  | 
Updating the TLS version and cipher support requires a complete NFM-P system shutdown, which creates a network management outage.
Perform the procedure only during a scheduled maintenance period of sufficient duration with the guidance of technical support.
Outdated TLS versions or ciphers present a security risk. Perform this procedure to update the lists of supported TLS versions and ciphers in an NFM-P system.
Note: An NFM-P system upgrade replaces the current TLS version and cipher support settings with the defaults for the new release. After an upgrade, you may need to reconfigure the settings.
Note: You require the following user privileges:
Note: The Oracle management user and group names are specified during database installation; the default is ‘oracle’ in the ‘dba’ group.
Note: The following RHEL CLI prompts in command lines denote the active user, and are not to be included in typed commands:
Steps
Prepare new cipher and TLS files | |
1   | 
 Log in to the standalone or primary NFM-P main server station as the nsp user.  | 
2   | 
 Enter the following: bash$ cd /opt/nsp/nfmp/server/nms/bin/security_management/ssl ↵  | 
3   | 
 Enter the following to create the default cipher list file: bash$ ./ciphers_and_tls_update.bash create -cdc default-ciphers-file ↵  | 
4   | 
 Enter the following to create the default TLS list file: bash$ ./ciphers_and_tls_update.bash create -cdt default-TLS-file ↵  | 
5   | 
 Enter the following to copy the default ciphers file to a new file: bash$ cp default-ciphers-file new_ciphers_file ↵ where new_ciphers_file is the name to assign to the new ciphers file  | 
6   | 
 Open new_ciphers_file using a plain-text editor such as vi.  | 
7   | 
 Edit the file to remove any unsupported ciphers.  | 
8   | 
 Save and close the file.  | 
9   | 
 Enter the following to copy the default TLS file to a new file: bash$ cp default-TLS-file new_TLS_file ↵ where new_TLS_file is the name to assign to the new TLS file  | 
10   | 
 Open new_TLS_file using a plain-text editor such as vi.  | 
11   | 
 Edit the file to remove any unsupported TLS versions. Note: You must not remove TLSv1.2. Note: TLSv1.0 and TLSv1.1 are deprecated in IETF RFC draft-ietf-tls-oldversions-deprecate-06.  | 
12   | 
 Save and close the file.  | 
Distribute files to system components | |
13   | 
 If the NFM-P system is redundant, distribute the required files to the standby main server station. 
  | 
14   | 
 If the system includes one or more auxiliary servers, distribute the required files to each auxiliary server station. 
  | 
15   | 
 If the system includes one or more NSP Flow Collectors, distribute the required files to each NSP Flow Collector station. 
  | 
16   | 
 Distribute the required files to each main database station. 
  | 
Stop NFM-P system | |
17   | 
 Close the open client sessions. 
  | 
18   | 
 If the NFM-P system is redundant, stop the standby main server. 
  | 
19   | 
 If the system includes one or more auxiliary servers, stop each auxiliary server. 
  | 
20   | 
 If the system includes one or more NSP Flow Collector Controllers and Flow Collectors, stop each NSP Flow Collector Controller. Note: If the NSP Flow Collector Controller is collocated on a station with an NSP Flow Collector, stopping the NSP Flow Collector Controller also stops the Flow Collector. 
  | 
21   | 
 If the system includes one or more NSP Flow Collectors that are not collocated on a station with a Flow Collector Controller, stop each such Flow Collector. 
  | 
22   | 
 Stop the standalone or primary main server. 
  | 
23   | 
 If the NFM-P system is redundant, stop the standby database proxy. 
  | 
24   | 
 Stop the standalone or primary database proxy. 
  | 
Apply new cipher and TLS lists | |
25   | 
 Perform the following steps on each main database station to apply the new TLS configuration. 
  | 
26   | 
 Perform the following steps on each main server station to apply the new TLS configuration. 
  | 
27   | 
 If the system includes one or more auxiliary servers, perform the following steps on each auxiliary server station to apply the new TLS configuration. 
  | 
28   | 
 If the system includes one or more NSP Flow Collectors, perform the following steps on each NSP Flow Collector Controller and Flow Collector station to apply the new TLS configuration. 
  | 
Start NFM-P system | |
29   | 
 Start the standalone or primary database proxy. As the root user on the database station, enter the following: # systemctl start nfmp-oracle-proxy.service ↵ The database proxy starts.  | 
30   | 
 If the NFM-P system is redundant, start the standby database proxy. As the root user on the standby database station, enter the following: # systemctl start nfmp-oracle-proxy.service ↵ The database proxy starts.  | 
31   | 
 Start the standalone or primary main server. As the nsp user on the main server station, enter the following: bash$ /opt/nsp/nfmp/server/nms/bin/nmsserver.bash start ↵ The main server starts.  | 
32   | 
 If the NFM-P system is redundant, start the standby main server. As the nsp user on the standby main server station, enter the following: bash$ /opt/nsp/nfmp/server/nms/bin/nmsserver.bash start ↵ The main server starts.  | 
33   | 
 If the system includes one or more auxiliary servers, start each auxiliary server. As the nsp user on the auxiliary server station, enter the following: bash$ /opt/nsp/nfmp/auxserver/nms/bin/auxnmsserver.bash auxstart ↵ The auxiliary server starts.  | 
34   | 
 If the system includes one or more NSP Flow Collectors, start each NSP Flow Collector Controller and Flow Collector. Note: If the NSP Flow Collector Controller is collocated on a station with a Flow Collector, starting the NSP Flow Collector Controller also starts the Flow Collector. 
  | 
35   | 
 If the system includes one or more NSP Flow Collectors that are not collocated on a station with a Flow Collector Controller, start each such Flow Collector. 
  | 
36   | 
 Close the open console windows. End of steps  |