Data Protection and Information Lifecycle Management

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Fabrics

     deterministic     switched 2nd     virtual 2nd 3rdFailover     defined

     in remote copy 2nd

False positive events

FC [See Fibre Channel (FC)]

FC Ping

FC-SP (Fibre Channel Security Protocol)

FCAP (Fibre Channel Authentication Protocol)

FCIP (Fibre Channel over IP)

FCP (Fibre Channel SCSI) 2nd

Federal Emergency Management Agency

Fibre Channel (FC)

     addressing in 2nd

     arbitrated loops 2nd

     defined

     FC-SP and FCAP protocols     hard zoning in 2nd

     network stack 2nd

     SAN components in 2nd

     topology 2nd

     vs. SAN     vulnerabilities         authentication 2nd

         encryption         FC analyzers         FC arbitrated loop and LIPs         file system bypassing 2nd

         gateway devices 2nd         isolation 2nd         management interfaces in 2nd         trust issues 2nd Fibre Channel Arbitrated Loop 2nd Fibre Channel Authentication Protocol (FCAP) Fibre Channel Industry Association

Fibre Channel over IP (FCIP)

Fibre Channel SCSI (FCP) 2nd Fibre Channel Security Protocol (FC-SP)File heads

     defined

     in NAS 2nd

File I/O 2nd

File replication File systems 2nd

     bypassing in FC 2nd     defined

     in location paths Filers Financial losses FinesFirewalls

     defined

     diversity of

     operation of 2nd

     with iSCSI 2nd

Flexibility, ILM for

Full backups 2nd 3rd

Full-bandwidth connections

 < Day Day Up >   

Категории