Frame Redirection Zoning; Creating An Initiator - Target Zone - Brocade Communications Systems Brocade 8/12c Administrator's Manual

Supporting hp secure key manager (skm) environments and hp enterprise secure key manager (eskm) environments
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

2. From any configured primary FCS switch, change the default zoning setting to No Access.

Frame redirection zoning

Name Server-based frame redirection enables the Brocade Encryption Switch or blade to be
deployed transparently to hosts and targets in the fabric.
NS-based frame redirection is enabled as follows:
Host-target zoning must precede any CryptoTarget configuration.
NOTE
To enable frame redirection, the host and target edge switches must run Fabric OS v6.1.1 and
Fabric OS v5.3.1.b or later firmware to ensure host and target connectivity with legacy platforms. In
McDATA fabrics, the hosts and the switches hosting the targets require firmware versions
M-EOSc 9.8 and M-EOSn 9.8 or later.

Creating an initiator - target zone

NOTE
NWWN based zoning of initiator and targets is not supported with Frame redirection.
1. Log into the group leader as Admin or FabricAdmin.
2. Determine the initiator PWWN. Enter the nsshow command to view the devices connected to
Fabric OS Encryption Administrator's Guide
53-1002159-03
switch:admin> defzone --noaccess
switch:admin> cfgfsave
The change will be applied within the entire fabric.
You first create a zone that includes host (H) and target (T). This may cause temporary traffic
disruption to the host.
You then create a CryptoTarget container for the target and configure the container to allow
access to the initiator.
When you commit the transaction, a special zone called a "redirection zone" is generated
automatically. The redirection zone includes the host (H), the virtual target (VT), the virtual
initiator (VI), and the target (T).
When configuring multi-path LUNs, do not commit the CryptoTarget container configuration
before you have performed the following steps in sequence to prevent data corruption. Refer to
the section
"Configuring a multi-path Crypto LUN"
-
Complete all zoning for ALL hosts that should gain access to the targets.
-
Complete the CryptoTarget container configuration for ALL target ports in sequence,
including adding the hosts that should gain access to these targets.
this switch. In the following example, the port name 10:00:00:00:c9:2b:c9:3a is the initiator
PWWN.
FabricAdmin:switch>nsshow
{
Type Pid
COS PortName
N 010600; 2,3;10:00:00:00:c9:2b:c9:3a;20:00:00:00:c9:2b:c9:3a; na
NodeSymb: [35] "Emulex LP9002 FV3.82A1 DV5-4.81A4 "
Fabric Port Name: 20:06:00:05:1e:41:9a:7e
Zoning considerations
on page 166 for more information.
NodeName
3
TTL(sec)
145

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os encryption

Table of Contents