search for: network_encryption

Displaying 1 result from an estimated 1 matches for "network_encryption".

2018 Jan 03
0
Trusted pool authentication & traffic encryption
...nstance an attacker could try IP spoofing in a datacentre or they could record all traffic that passes through a switch. I suspect both questions might be answered with TLS/SSL encryption (e.g. https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/administration_guide/chap-network_encryption) but I would like confirmation and preferably some more details how the hosts/bricks authenticate to each other and if any assumptions are being made. Kind regards, Omar