Enabling Directory-Based IP Restrictions | Teradata Vantage - Enabling Directory-Based IP Restrictions with the ipdir2bin Utility - Advanced SQL Engine - Teradata Database

Security Administration

Product
Advanced SQL Engine
Teradata Database
Release Number
17.05
17.00
Published
September 2020
Language
English (United States)
Last Update
2021-01-23
dita:mapPath
ied1556235912841.ditamap
dita:ditavalPath
lze1555437562152.ditaval
dita:id
B035-1100
lifecycle
previous
Product Category
Teradata Vantageā„¢

The ipdir2bin utility transfers the directory-based IP address restrictions to the IP GDO.

  1. From the /site directory on the lowest numbered Teradata Vantage SQL Engine node, run the ipdir2bin utility, to commit directory IP restrictions to the database GDO.
    $ ipdir2bin -u  dir_username  [-w  dir_password] [-h  dir_server_name]
    [-S  system_name]
    Enter LDAP password:
    Parse successful
    608 bytes written to the ipfilter GDO.

    where:

    Option Description
    -u dir_username Required. Specifies the FQDN of the directory user running the utility.
    -w dir_password Optional. Specifies the password for the -u user.

    If -w does not contain a value, the system prompts the user for a password.

    -h dir_server_name Optional. Identifies the directory server.

    If this option is not present in the statement, the utility uses the value for the LdapServerName property.

    If the LdapServerName property is unavailable or not specified, the utility uses the name of the default directory server for the system. See LdapServerName.

    The default directory server is specified by the administrator when:
    • Adding a system to a domain
    • Explicitly naming the server in the etc/ldap.conf file on a Teradata Vantage system.
    -S system_name Optional. Identifies the FQDN of the Vantage system, as it appears in the tdatSystem object in the directory.

    If restrictions are configured for a single Vantage system, the tdatSystem object has the name of the system.

    If directory users log on through Unity, the IP restrictions must be configured identically for all Vantage systems. IP restrictions for all database systems are the children of a single tdatSystem object.
    • If -S does not specify a value, ipdir2bin uses the value of the LdapSystemFQDN property from the TDGSS configuration files.
    • If the LdapSystemFQDN property also contains no value, the utility exits with an error.

    See LdapSystemFQDN.

    The command populates the GDO and distributes it to all database nodes.

  2. To enable the committed restrictions, run the tpareset utility. For more information, see Teradata Vantageā„¢ - Database Utilities , B035-1102 .
    This step is only necessary for the initial implementation of IP restrictions, and does not apply to revisions.
  3. If the fully enabled IP restrictions do not function as needed, you can:

    In most cases, Testing XML-Based IP Restrictions should uncover any problems before you enable them on the system.

  4. In a Unity environment, repeat this procedure for each Vantage system.