Single Encryption Switch, Two Paths From Host To Target - Brocade Communications Systems Brocade 8/12c Administrator's Manual

Supporting hp secure key manager (skm) environments and hp enterprise secure key manager (eskm) environments
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

4

Single encryption switch, two paths from host to target

Single encryption switch, two paths from host to target

Figure 96
one host and one storage device over two the following two paths:
Host port 1 is zoned with target port 1, and host port 2 is zoned with target port 2 to enable the
redirection zoning needed to redirect traffic to the correct CTC.
FIGURE 96
176
shows a basic configuration with a single encryption switch providing encryption between
Host port 1 to target port 1, redirected through CTC T1.
Host port 2 to target port 2, redirected through CTC T2.
Single encryption switch, two paths from host to target
Fabric OS Encryption Administrator's Guide
53-1002159-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os encryption

Table of Contents