HP StorageWorks 4000/6000/8000 - Enterprise Virtual Arrays Reference Manual page 12

San design
Hide thumbs Also See for StorageWorks 4000/6000/8000 - Enterprise Virtual Arrays:
Table of Contents

Advertisement

Storage security compliance .............................................................................................. 402
Security technologies ........................................................................................................ 402
IP SAN security technologies ....................................................................................... 403
Fibre Channel SAN security technologies ...................................................................... 403
Encryption security technologies ................................................................................... 403
Key management ....................................................................................................... 404
Organizational security policies ................................................................................... 404
HP security strategy .......................................................................................................... 404
HP Secure Advantage ................................................................................................ 404
Resource protection ............................................................................................. 405
Data protection ................................................................................................... 405
Security validation ............................................................................................... 406
Storage security best practices ........................................................................................... 406
Assessing security risks ............................................................................................... 407
Managing organizational risks .............................................................................. 407
Data security implementations ............................................................................... 407
HP storage security solutions .............................................................................................. 407
C-series Storage Media Encryption ............................................................................... 407
C-series SAN-OS security ............................................................................................ 408
C-series IP SAN security .............................................................................................. 409
B-series Encryption Switch and Encryption FC Blade security ............................................ 410
B-series Fabric OS security .......................................................................................... 411
Resource protection ............................................................................................. 411
Data protection ................................................................................................... 413
Security validation ............................................................................................... 415
Key management ....................................................................................................... 415
19 Best practices .......................................................................... 417
SAN planning ................................................................................................................ 417
Design specification .......................................................................................................... 418
SAN topology ................................................................................................................ 418
Multi-fabric SANs ...................................................................................................... 418
Failover protection ..................................................................................................... 418
Data access patterns .................................................................................................. 418
ISL ratio .................................................................................................................... 419
Incremental SAN expansion ........................................................................................ 419
SAN configuration .......................................................................................................... 419
Fibre Channel switch configuration ............................................................................... 420
Server setup .............................................................................................................. 420
Storage system configuration ....................................................................................... 420
Storage-based LUN masking .............................................................................................. 420
Zoning ............................................................................................................................ 421
Zoning enforcement ................................................................................................... 421
Zoning guidelines ...................................................................................................... 421
Zoning by operating system .................................................................................. 422
Zoning by HBA ................................................................................................... 422
Zoning by application .......................................................................................... 422
Zoning by port allocation ..................................................................................... 422
EBS zoning ............................................................................................................... 423
Zone naming ............................................................................................................ 423
Naming by identifier type ........................................................................................... 423
Case sensitivity of fabric identifiers ............................................................................... 423
Server naming ........................................................................................................... 423
Storage system naming ............................................................................................... 423
12

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the StorageWorks 4000/6000/8000 - Enterprise Virtual Arrays and is the answer not in the manual?

Questions and answers

Table of Contents