12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Indexhuman threat 9Iidentification 18IEEE 8insider threats 2, 11insistent domain ID (IDID) 23Integrated Routing (IR) 16inter-fabric link (IFL) 24inter-switch link (ISL) 8IP filter (IPF) 7IPSec (IP security) 15, 20iSCSI 1JJBOD (just a bunch of disks) 6Kkey 3key management 15Key Management InteroperabilityProtocol (KMIP) 3key space 3LLDAP (Lightweight Directory AccessProtocol) 21log file 16, 25logging 15, 18Logical Fabric 10, 17logical SAN (LSAN) 8Logical Switch 10, 17login banner 6logs 16loop initialization process (LIP) 2LUN (logical unit number) 8, 26LUN masking 4MMAC (Management Access Control)policy 3MAC policy 3management interface 2man-in-the-middle (MITM) attack 16metaSAN 23monitoring 16multi-factor authentication 18NN_Port 8National Standards Bureau (NSB)11network data monitoring 3node port 8node WWN (nWWN) 9OOASIS (Organization for theAdvancement of StructuredInformation Standards) 8, 3opaque key exchange 17PParkerian Hexad 4partial-mesh topology 21password management 12password policy 8path selection protocols 13PCI-DSS (Payment Card IndustryData Security Standard) 1PCI-DSS merchant levels 3Personal Information Protection andElectronic Documents Act(PIPEDA) 1Personally Identifiable Information(PII) 2physical security 21, 23plaintext 3Policy-Based Routing (PBR) 2port WWN (pWWN) 9preventive measures 6protection profile (PP) 12Public Key Infrastructure (PKI) 5, 13purging, data 26Qquorum 7RRADIUS (Remote AuthenticationDial-In User Service) 21registered state change notificationSecuring Fibre Channel Fabrics 209

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!