Главная
Study mode:
on
1
Agenda
2
Security Functions
3
Bidirectional Authentication
4
opportunistic TLS
5
protocol diagram
6
provisioning problem
7
symmetric protocol
8
authentication verification entity
9
authentication protocol
10
key provisioning
11
host provisioning
12
example
13
Ideal Fabric Authentication Provision
14
NVMe Initial Provisioning
15
Summary
16
Questions
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore a 45-minute conference presentation from the Storage Developer Conference 2022 that delves into scaling security solutions for NVMe over IP fabrics. Learn about fundamental security methods like DH-HMAC-CHAP authentication and TLS secure channels, while understanding their current scalability limitations in large fabric deployments. Discover how the Authentication Verification Entity mechanism offers a solution to simplify and scale security implementations effectively. Master key concepts including bidirectional authentication, opportunistic TLS, protocol diagrams, and symmetric protocols through detailed explanations by Dell expert Claudio DeSanti. Gain practical insights into host provisioning, key provisioning, and NVMe initial provisioning processes that make security deployment more manageable in NVMe over IP fabric environments.

Scaling NVMe Over IP Fabric Security - Making Authentication Simple and Deployable

SNIAVideo
Add to list