Network Connections; Blade Processor Links - Brocade Communications Systems WFT-2D User Manual

San user manual
Table of Contents

Advertisement

Network connections

Before you use the encryption setup wizard for the first time, you must have the following required
network connections:

Blade processor links

Each encryption switch or blade has two GbE ports labeled Ge0 and Ge1. The Ge0 and Ge1 ports
are Ethernet ports that connect encryption switches and blades to other encryption switches and
blades. Both ports of each encryption switch or blade must be connected to the same IP network
and the same subnet. Static IP addresses should be assigned. Neither VLANs nor DHCP should be
used. These two ports are bonded together as a single virtual network interface to provide link layer
redundancy.
All encryption switches and blades in an encryption group must be interconnected by these links
through a dedicated LAN before their encryption engines are enabled. Both ports of each
encryption switch or blade must be connected to the same IP network and the same subnet. Static
IP addresses should be assigned. VLANs should not be used, and DHCP should not be used.
Security parameters and certificates cannot be exchanged if these links are not configured and
active.
The Blade Processor Link dialog box can be launched from the following locations:
Brocade Network Advisor SAN User Manual
53-1003154-01
The management ports on all encryption switches and DCX Backbone Chassis CPs that have
Encryption Blades installed must have a LAN connection to the SAN management program,
and must be available for discovery.
A supported key management appliance must be connected on the same LAN as the
management port, which supports the encryption switches, DCX Backbone Chassis CPs, and
the SAN Management program.
In some cases, you might want to have an external host available on the LAN to facilitate
certificate exchange between encryption nodes and the key management appliance. You may
use the SAN management program host computer rather than an external host.
All switches in the planned encryption group must be interconnected on a private LAN using
the eth-0 and eth-1 ports located on the encryption switch or encryption blade. (We refer to
these ports as RJ-45 gigabit Ethernet ports (labeled eth0 and eth1) for clustering and
centralized management of multiple encryption switches through a group leader.)
Select an encryption group from the Encryption Center Devices table, then select Group >
HA Clusters from the menu task bar. The Properties dialog box displays with the HA Clusters
tab selected. Select a device from the Non-HA Encryption Engines table, then click
Configure Blade Processor Link.
Select a group, switch, or engine from the Encryption Center Devices table, then select
Group/Switch/Engine > Targets from the menu task bar. Select a container from the
Encryption Targets table, click LUNs, then click Configure Blade Processor Link.
Select an engine from the Encryption Center Devices table, then select Engine >
Blade Processor Link.
Network connections
20
707

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network advisor 12.3.0

Table of Contents