Upon completing this chapter, you will be able to:
Define some of the most common security terms
Explain the benefits of Role Based Access Control (RBAC) and Authentication, Authorization, and Accounting (AAA)
Describe the features of the most common AAA protocols and management protocols
Enumerate the security services supported by Ethernet, IP, TCP, Internet Small Computer System Interface (iSCSI), Fibre Channel (FC), Fibre Channel Protocol (FCP), and Fibre Channel over TCP/IP (FCIP)
This chapter highlights some of the most prevalent security protocols related to modern storage networks. Many books have been written solely on the topic of information security, so this chapter does not delve into the details of ...