Index – HP Secure Key Manager User Manual
Page 322
fulfill client traffic, the secondary device stands down and the primary device
again becomes the active device.
Primary device
A designated device that, when up and running, is the active device.
RSA key
A public-key encryption technology using an algorithm that is the industry
standard for encryption.
Secondary device
A designated device that is passive. If the primary device goes down, then the
secondary becomes the active device until the primary is back up.
Secure Sockets
Layer
a protocol for transmitting private documents via the Internet. SSL uses a
cryptographic system that uses two keys to encrypt data − a public key known
to everyone and a private or secret key known only to the recipient of the
message. By convention, URLs that require an SSL connection start with https:
instead of http:.
Security officer
(SO)
Slave
See Secondary device
Use model
An organizational scheme that is used to define your storage environment and
decide how to configure your system for SKM encryption.
Virtual IP (VIP)
address
Stands for an IP address that is only accessible on the active machine. This is
also referred to as a floating IP.
Virtual MAC
(VMAC) address
Is calculated and assigned to the network interfaces using the following
algorithm according to RFC 2338.7.3: VMAC = 00:00:5E:00:01:
Virtual Router
Identifier (VRID)
Network interfaces across machines that have identical VRIDs constitute a virtual
group. This is also known as Ethernet Group ID. This group shares a common
set of VIPs.
322
Glossary