12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index(RSCN) 10resilient core-edge topology 22role-based access control (RBAC)13, 8, 11routed fabric 23RSA 13RSCN 9SSAN security model 1sanitization, data 24Sarbanes-Oxley Act (SOX) 8SB 1386 2SCC policy 3SCP 20SCP (Secure Copy Protocol) 2, 3Secure Fabric OS 6Secure Fabric OS (SFOS) 2secure management interface 4Secure Socket Layer (SSL) 14security assessment 28security audit 28security incident response (CSIR)plan 27security target (ST) 12Security Technical ImplementationGuides (STIG) 13security vulnerability 6separation of duties 2, 7separation of duties. 13service level agreement (SLA) 24Sharing Peripherals Across theNetwork (SPAN) 13signed firmware 21small form factor pluggable (SFP) 4SNIA (Storage Networking IndustryAssociation) 8sniffers 3sniffing 3, 16experiments 4, 7SNMP (Simple NetworkManagement Protocol) 16, 3social engineering 14spoofing 17SSH 27SSIF (Storage Security IndustryForum) 8storageJBOD 6storage LUN 8storage-based encryption 23stream cipher 8substitution cipher 3Switch Connection Control (SCC)policy 6switched fabric (FC-SW) 2symmetric cryptography 4syslog 25syslogd (syslog daemon) 19Ttarget of evaluation (TOE) 12TCP/IP protocol 2technological threat 8threats 7external 10human 9insider 2, 11technological 8topologycore-edge 21full-mesh 19partial-mesh 21resilient core-edge 22Traffic Isolation (TI) 11traffic isolation zones 17transposition cipher 3trunking 15trusted key exchange 16UU_Port 8universal port 8user accounts 8user management 12VVirtual Fabrics (VF) 10, 17VPN (Virtual Private Network) 2210 Securing Fibre Channel Fabrics

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!