Installation guide

Glossary 65
encryption
Translation of data into a secret format using a series of mathematical
functions so that only the recipient can decode it. Designed to protect
unauthorized viewing or modification of data, even when the encrypted data is
travelling over unsecure media (such as the Internet). See 3DES and SSH. As
an example, a remote terminal session using secure shell SSH usually
encrypts data using 3DES or better algorithms. Encryption is one of the
security features provided on Cyclades products to enable customers to
enforce their data center security policies. See also
authentication and
authorization.
ESP (encapsulating security payload)
One of the two main protocols used by IPSec (AH is the other). ESP encrypts
and authenticates data flowing over the connection. Does not define the
authentication method that must be used. DES, 3DES, AES, and Blowfish are
commonly used with ESP.
Ethernet bonding
Synonymous with Ethernet failover. A way of configuring two Ethernet ports
on a single device with the same IP address so that if the primary Ethernet port
becomes unavailable, the secondary Ethernet port is used. When bonding is
enabled, the active IP address is assigned to bond0 instead of eth0. When the
primary Ethernet port returns to active status, the software returns it to
operation.
Ethernet failover
See Ethernet bonding. See also failover.
event log
Referred to as the system event log (SEL) on most service processors, a
timestamped record of events such as power on/off, device inserts/removals/
connects/disconnects, sensor threshold events and alerts.