beautypg.com

Brocade Fabric OS Encryption Administrator’s Guide Supporting Key Management Interoperability Protocol (KMIP) Key-Compliant Environments (Supporting Fabric OS v7.1.0) User Manual

Page 243

background image

Fabric OS Encryption Administrator’s Guide (KMIP)

225

53-1002747-02

VMware ESX server deployments

4

Figure 131

shows a VMware ESX server with two guest operating systems where two guests access

a fabric over a shared port. To enable this, both guests are assigned a virtual port.

There are two paths to a target storage device:

Virtual host port 1, through the shared host port, to target port 1, redirected through CTC T1.

Virtual host port 2, through the shared host port, to target port 2, redirected through CTC T2.

In this case, the virtual host port 1 is zoned with target port 1, and the virtual host port 2 is zoned
with target port 2 to enable the redirection zoning needed to redirect traffic to the correct CTC.

FIGURE 131

VMware ESX server, One HBA shared by two guest OS