EasyManua.ls Logo

Fujitsu ETERNUS AF250 S2 - Security

Fujitsu ETERNUS AF250 S2
171 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
11.4 Security
Solution Overview
Unauthorized access can be monitored by using the
ETERNUS AF's audit log collection and transfer function.
Use acquired audit log information as audit trail information to monitor and track suspicious operations and
access.
Centralized administrative control of SED authentication keys in an external server can be performed by link-
ing with the key server. Even if a data drive in the ETERNUS AF is stolen, data leakage can be prevented by
safely storing the authentication key. Automatic updating of the authentication key on a periodic basis also
enhances the security of the entire system.
Key groups
- as audit information when
system audits are performed
- to monitor and report the
storage system status
Audit logs are used
Log in
Log out
Change settings
Syslog server
Management LAN
Information such as
the storage system name,
the user information,
the process time,
the process details,
and the process results
Audit log
System administrator
Auditor
ETERNUS AF
SED SED SED SED
RAID group #0
SED SED SED SED
RAID group #1
ETERNUS SF KM
The authentication key is
updated periodically according
to the specified schedule
Key server
Configuration Procedure
Use the ETERNUS AF
to enable the audit log transmission function and to register the Syslog server as the
destination to which audit logs are sent.
When key management server linkage is used, set up SED key management in the operation management
server (ETERNUS SF KM). Use the ETERNUS AF to create a key group and to register the key server. Keys are
created in the operation management server. The ETERNUS AF requests the key to be extracted from the op-
eration management server or requests the key to be updated when required.
Required Environment
A Syslog server is required for the destination for the transmission of the audit log that is collected.
Note that ETERNUS SF KM is required when linking with the key management server.
Chapter 11 Solution Configuration
11.4 Security
168
FUJITSU Storage ETERNUS AF250 S2, ETERNUS AF250 All-Flash Arrays
Configuration Guide (Basic)
Copyright 2017 FUJITSU LIMITED
P3AG-1832-04ENZ0

Table of Contents

Other manuals for Fujitsu ETERNUS AF250 S2

Related product manuals