Dual Fabric Deployment - Ha And Dek Cluster - Brocade Communications Systems Brocade 8/12c Administrator's Manual

Supporting hp secure key manager (skm) environments and hp enterprise secure key manager (eskm) environments
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

In
Figure
port 1 to target port 1 is defined in a CryptoTarget container on one encryption switch, and the path
from host port 2 to target port 2 is defined in a CryptoTarget container on the other encryption
switch. This forms a DEK cluster between encryption switches for both target paths. The DEK
cluster handles the target/host path failover along with the failure of either encryption switch.

Dual fabric deployment - HA and DEK cluster

Figure 99
directors and several host and target edge switches in a highly redundant core-edge topology.
Figure 99
each fabric. There are two encryption switches in each fabric, interconnected through a dedicated
cluster LAN. The Ge1 and Ge0 gigabit Ethernet ports on each of these switches are attached to this
LAN. encryption switches 1 and 3 act as a high availability cluster in fabric 1, providing automatic
Fabric OS Encryption Administrator's Guide
53-1002159-03
98, two encryption switches are required, one for each target path. The path from host
shows an encryption deployment in a dual fabric SAN. Both fabrics have dual core
FIGURE 99

Dual fabric deployment - HA and DEK cluster

shows two paths to the target device, one in each fabric. The host also has a path to
Dual fabric deployment - HA and DEK cluster
4
179

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os encryption

Table of Contents