EasyManua.ls Logo

HP StorageWorks 4000/6000/8000 - Enterprise Virtual Arrays - Page 12

HP StorageWorks 4000/6000/8000 - Enterprise Virtual Arrays
456 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Storage security compliance .............................................................................................. 402
Security technologies ........................................................................................................ 402
IP SAN security technologies ....................................................................................... 403
Fibre Channel SAN security technologies ...................................................................... 403
Encryption security technologies ................................................................................... 403
Key management ....................................................................................................... 404
Organizational security policies ................................................................................... 404
HP security strategy .......................................................................................................... 404
HP Secure Advantage ................................................................................................ 404
Resource protection ............................................................................................. 405
Data protection ................................................................................................... 405
Security validation ............................................................................................... 406
Storage security best practices ........................................................................................... 406
Assessing security risks ............................................................................................... 407
Managing organizational risks .............................................................................. 407
Data security implementations ............................................................................... 407
HP storage security solutions .............................................................................................. 407
C-series Storage Media Encryption ............................................................................... 407
C-series SAN-OS security ............................................................................................ 408
C-series IP SAN security .............................................................................................. 409
B-series Encryption Switch and Encryption FC Blade security ............................................ 410
B-series Fabric OS security .......................................................................................... 411
Resource protection ............................................................................................. 411
Data protection ................................................................................................... 413
Security validation ............................................................................................... 415
Key management ....................................................................................................... 415
19 Best practices .......................................................................... 417
SAN planning ................................................................................................................ 417
Design specification .......................................................................................................... 418
SAN topology ................................................................................................................ 418
Multi-fabric SANs ...................................................................................................... 418
Failover protection ..................................................................................................... 418
Data access patterns .................................................................................................. 418
ISL ratio .................................................................................................................... 419
Incremental SAN expansion ........................................................................................ 419
SAN configuration .......................................................................................................... 419
Fibre Channel switch configuration ............................................................................... 420
Server setup .............................................................................................................. 420
Storage system configuration ....................................................................................... 420
Storage-based LUN masking .............................................................................................. 420
Zoning ............................................................................................................................ 421
Zoning enforcement ................................................................................................... 421
Zoning guidelines ...................................................................................................... 421
Zoning by operating system .................................................................................. 422
Zoning by HBA ................................................................................................... 422
Zoning by application .......................................................................................... 422
Zoning by port allocation ..................................................................................... 422
EBS zoning ............................................................................................................... 423
Zone naming ............................................................................................................ 423
Naming by identifier type ........................................................................................... 423
Case sensitivity of fabric identifiers ............................................................................... 423
Server naming ........................................................................................................... 423
Storage system naming ............................................................................................... 423
12

Table of Contents

Related product manuals