3DES
Triple Data Encryption Standard, an encrypting algorithm (cipher) that
encrypts data three times, using a unique key each time, to prevent
unauthorized viewers from viewing or changing it. 3DES encryption is one of
the security features provided by Cyclades products to
support data center
security policies.
authentication
Controlling access by requiring users to enter names and passwords. Anyone
accessing Cyclades products and connected devices must log in by entering a
username and password. The usernames and passwords entered during login
attempts are checked against a database that lists all the valid usernames
along with the encrypted passwords. Access is denied if the username or
password is not valid. The password database being checked can reside either
locally (on the device being accessed) or on an authentication server on the
network. If an authentication method is selected that relies on a server, the
corresponding authentication server must be already installed and configured
in order for authentication to work. Using one or more of the many types of
popular authentication methods can reduce administrator workload when an
administrator needs to add, modify, of delete user accounts.
ALOM (Advanced Lights Out Manager)
Remote out-of-band management technology on certain Sun servers that
includes an independent system controller (service processor) and firmware.
Provides remote monitoring, logging, alerting, and basic control of the server
in a “lights out” environment.
ASIC
Application-Specific Integrated Circuit. Pronounced “ay-sik.” A type of chip
used for applications that provide a specific function, such as an ASIC chips
that serves as a BMC.
Glossary
Содержание AlterPath Manager 2500
Страница 16: ...xiv AlterPath Manager Installation Configuration and User s Guide ...
Страница 20: ...xviii AlterPath Manager Installation Configuration and User s Guide ...
Страница 32: ...AdditionalResources xxx APM Installation Configuration and User s Guide ...
Страница 52: ...OnSite Support 20 APM Installation Configuration and User s Guide ...
Страница 74: ...Pre Configuration Requirements 42 APM Installation Configuration and User s Guide ...
Страница 116: ...User s Profile 84 APM Installation Configuration and User s Guide ...
Страница 228: ...Groups 196 APM Installation Configuration and User s Guide Figure 4 57 New User Group Security Form ...
Страница 286: ...Redundant Fault Tolerant Configuration 254 APM Installation Configuration and User s Guide ...
Страница 354: ...Data Logging Session Activation 322 AlterPath Manager Installation Configuration and User s Guide ...
Страница 364: ...332 APM Installation Configuration and User s Guide ...