4
Single encryption switch, two paths from host to target
Single encryption switch, two paths from host to target
Figure 96
one host and one storage device over two the following two paths:
•
•
Host port 1 is zoned with target port 1, and host port 2 is zoned with target port 2 to enable the
redirection zoning needed to redirect traffic to the correct CTC.
FIGURE 96
176
shows a basic configuration with a single encryption switch providing encryption between
Host port 1 to target port 1, redirected through CTC T1.
Host port 2 to target port 2, redirected through CTC T2.
Single encryption switch, two paths from host to target
Fabric OS Encryption Administrator's Guide
53-1002159-03