beautypg.com

Multi-path lun configuration example – Brocade Fabric OS Encryption Administrator’s Guide Supporting NetApp Lifetime Key Manager (LKM) and KeySecure Storage Secure Key Manager (SSKM) Environments (Supporting Fabric OS v7.2.0) User Manual

Page 172

background image

154

Fabric OS Encryption Administrator’s Guide (LKM/SSKM)

53-1002925-01

Configuring a multi-path Crypto LUN

3

To avoid the risk of data corruption, you must observe the following rules when configuring
multi-path LUNs:

During the initiator-target zoning phase, complete in sequence all zoning for ALL hosts that
should gain access to the targets before committing the zoning configuration.

Complete the CryptoTarget container configuration for ALL target ports in sequence and add
the hosts that should gain access to these ports before committing the container
configuration. Upon commit, the hosts lose access to all LUNs until the LUNs are explicitly
added to the CryptoTarget containers.

When configuring the LUNs, the same LUN policies must be configured for ALL paths of ALL
LUNs. Failure to configure all LUN paths with the same LUN policies results in data corruption.

Multi-path LUN configuration example

Figure 85

shows a single LUN on a dual-port target that is accessed over two paths by a dual-port

host. The two encryption switches form an encryption group and an HA cluster. The following
example illustrates a simplified version of a multi-path LUN configuration.

FIGURE 85

A LUN accessible through multiple paths

The following steps may be used to configure multiple path access to the LUN in

Figure 85

.

1. Create zoning between host port 1 and target port 1. Refer to the section

“Creating an initiator

- target zone”

on page 137 for instructions.

2. Create zoning between host port 2 and target port 2. Refer to the section

“Creating an initiator

- target zone”

on page 137 for instructions.