Index – HP Secure Key Manager User Manual

Page 322

Advertising
background image

fulfill client traffic, the secondary device stands down and the primary device

again becomes the active device.

Primary device

A designated device that, when up and running, is the active device.

RSA key

A public-key encryption technology using an algorithm that is the industry

standard for encryption.

Secondary device

A designated device that is passive. If the primary device goes down, then the

secondary becomes the active device until the primary is back up.

Secure Sockets

Layer

a protocol for transmitting private documents via the Internet. SSL uses a

cryptographic system that uses two keys to encrypt data − a public key known

to everyone and a private or secret key known only to the recipient of the

message. By convention, URLs that require an SSL connection start with https:

instead of http:.

Security officer

(SO)

Slave

See Secondary device

Use model

An organizational scheme that is used to define your storage environment and

decide how to configure your system for SKM encryption.

Virtual IP (VIP)

address

Stands for an IP address that is only accessible on the active machine. This is

also referred to as a floating IP.

Virtual MAC

(VMAC) address

Is calculated and assigned to the network interfaces using the following

algorithm according to RFC 2338.7.3: VMAC = 00:00:5E:00:01:

Virtual Router

Identifier (VRID)

Network interfaces across machines that have identical VRIDs constitute a virtual

group. This is also known as Ethernet Group ID. This group shares a common

set of VIPs.

322

Glossary

Advertising