fulfill client traffic, the secondary device stands down and the primary device
again becomes the active device.
Primary device A designated device that, when up and running, is the active device.
RSA key A public-key encryption technology using an algorithm that is the industry
standard for encryption.
Secondary device A designated device that is passive. If the primary device goes down, then the
secondarybecomestheactivedeviceuntiltheprimaryisbackup.
Secure Sockets
Layer
a protocol for transmitting private documents via the Internet. SSL uses a
cryptographic system that uses two keys to encrypt data − apublickeyknown
to everyone and a private or secret key known only to the recipient of the
message. By convention, URLs that require an SSL connection start with https:
instead of http:.
Security officer
(SO)
Slave See Secondary device
Use model An organizational scheme that is used to define your storage environment and
decide how to configure your system for SKM encryption.
Virtual IP (VIP)
address
Stands for an IP address that is only accessible on the active machine. This is
also referred to as a floating IP.
Virtual MAC
(VMAC) address
Is calculated and assigned to the network interfaces using the following
algorithm according to RFC 2338.7.3: VMAC = 00:00:5E:00:01:
Virtual Router
Identifier (VRID)
Network interfaces across machines that have identical VRIDs constitute a virtual
group.ThisisalsoknownasEthernetGroupID.Thisgroupsharesacommon
set of VIPs.
322
Glossary
Commentaires sur ces manuels