Brocade Communications Systems Brocade 8/12c Administrator's Manual page 208

Supporting hp secure key manager (skm) environments and hp enterprise secure key manager (eskm) environments
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

4
VMware ESX server deployments
Figure 107
a fabric over a shared port. To enable this, both guests are assigned a virtual port.
There are two paths to a target storage device:
In this case, the virtual host port 1 is zoned with target port 1, and the virtual host port 2 is zoned
with target port 2 to enable the redirection zoning needed to redirect traffic to the correct CTC.
FIGURE 107
188
shows a VMware ESX server with two guest operating systems where two guests access
Virtual host port 1, through the shared host port, to target port 1, redirected through CTC T1.
Virtual host port 2, through the shared host port, to target port 2, redirected through CTC T2.
Key Management
Appliance or
Key Vault
CTC1
(T1)
BES1
Io Sync Link
CTC1 - CTC for Target Port T1 hosted on BES1 in DEK Cluster
CTC2 - CTC for Target Port T2 hosted on BES2 in DEK Cluster
VMware ESX server, One HBA shared by two guest OS
Management
Network LAN
VMware ESX Server
Guest
Guest
OS1
OS2
V-Port1
V-Port2
FC HBA
Host Port1 (I1)
Fabric 1
Target Port1 (T1)
Target Port2 (T2)
Target
IO Sync Link
Dedicated Cluster
Network LAN
DCFM
CTC2
(T2)
BES4
Fabric OS Encryption Administrator's Guide
53-1002159-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os encryption

Table of Contents