12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 11: <strong>Brocade</strong> Data Encryption ProductsSecurity Processor + TRNGThe Security Processor provides data security functions such as generatingand processing symmetric keys (the DEK) based on the TRNG.The TRNG (True Random Number Generator) is the hardware componentused to generate the random number from which the DEK isgenerated. A TRNG uses physical phenomena such as transient noiseto truly randomize the random number generation process. The TRNGused in this solution meets the FIPS validation requirements.BatteryA Lithium-ion battery is used when there is no power to the encryptiondevice. This battery has a life span of approximately seven years afterpower has been removed from the encryption device. It is used primarilyto sustain the FIPS 140-2 Level 3 tamper response mechanism,which zeroizes the keys stored in the local cache once tampering hasbeen detected.The remaining components are found outside the security boundary.Control Processor (CP)The Control Processor performs various control and coordination functionssuch as authentication processes.Blade Processor (BP)The Blade Processor acts as a bridge between the Security Processorand the Control Processor, as well as with the Smart Card reader andGbE ports.Condor 2 ASICThe Condor 2 ASIC features forty 8 Gbps ports and is the heart of theFC Layer 2 switching. Each encryption device has two Condor 2 ASICs.190 Securing Fibre Channel Fabrics

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!