Hp Secure Key Manager User Manual Page 346

  • Download
  • Add to my manuals
  • Print
  • Page
    / 352
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 345
periodic time requests to servers, obtaining server time stamps, and using them
to adjust the client's clock.
Passive device In the VRRP group, the secondary device starts out as the passive device. As the
passive device, the role of the secondary device is to listen for VRRP messages
from the primary device. In the event that the primary device is unable to send
out those VRRP messages, the secondary device takes over as the active device,
receiving all network traffic. As soon as the primary device is able to fulfill client
traffic, the secondary device stands down and the primary device again becomes
the active device.
Primary device A designated device that, when up and running, is the active device.
RSA key A public-key encryption technology using an algorithm that is the industry standard
for encryption.
Secondary device A designated device that is passive. If the primary device goes down, then the
secondary becomes the active device until the primary is back up.
Secure Sockets
Layer
a protocol for transmitting private documents via the Internet. SSL uses a
cryptographic system that uses two keys to encrypt data a public key known
to everyone and a private or secret key known only to the recipient of the
message. By convention, URLs that require an SSL connection start with https:
instead of http:.
Security officer
(SO)
Slave See Secondary device
Use model An organizational scheme that is used to define your storage environment and
decide how to configure your system for SKM encryption.
Virtual IP (VIP)
address
Stands for an IP address that is only accessible on the active machine. This is
also referred to as a floating IP.
Virtual MAC
(VMAC) address
Is calculated and assigned to the network interfaces using the following algorithm
according to RFC 2338.7.3: VMAC = 00:00:5E:00:01:
Virtual Router
Identifier (VRID)
Network interfaces across machines that have identical VRIDs constitute a virtual
group. This is also known as Ethernet Group ID. This group shares a common
set of VIPs.
Glossary346
Page view 345

Comments to this Manuals

No comments