Hp Secure Key Manager Manual de usuario Pagina 322

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 327
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 321
fulll client trafc, the secondary device stands down and the primary device
again becomes the active device.
Primary device A designated device that, when up and running, is the active device.
RSA key A public-key encryption technology using an algorithm that is the industry
standard for encryption.
Secondary device A designated device that is passive. If the primary device goes down, then the
secondarybecomestheactivedeviceuntiltheprimaryisbackup.
Secure Sockets
Layer
a protocol for transmitting private documents via the Internet. SSL uses a
cryptographic system that uses two keys to encrypt data apublickeyknown
to everyone and a private or secret key known only to the recipient of the
message. By convention, URLs that require an SSL connection start with https:
instead of http:.
Security ofcer
(SO)
Slave See Secondary device
Use model An organizational scheme that is used to dene your storage environment and
decide how to congure your system for SKM encryption.
Virtual IP (VIP)
address
Stands for an IP address that is only accessible on the active machine. This is
also referred to as a oating IP.
Virtual MAC
(VMAC) address
Is calculated and assigned to the network interfaces using the following
algorithm according to RFC 2338.7.3: VMAC = 00:00:5E:00:01:
Virtual Router
Identier (VRID)
Network interfaces across machines that have identical VRIDs constitute a virtual
group.ThisisalsoknownasEthernetGroupID.Thisgroupsharesacommon
set of VIPs.
322
Glossary
Vista de pagina 321

Comentarios a estos manuales

Sin comentarios