beautypg.com

Dual fabric deployment - ha and dek cluster – Brocade Fabric OS Encryption Administrator’s Guide Supporting NetApp Lifetime Key Manager (LKM) and KeySecure Storage Secure Key Manager (SSKM) Environments (Supporting Fabric OS v7.2.0) User Manual

Page 197

background image

Fabric OS Encryption Administrator’s Guide (LKM/SSKM)

179

53-1002925-01

Dual fabric deployment - HA and DEK cluster

4

In

Figure 88

, two encryption switches are required, one for each target path. The path from host

port 1 to target port 1 is defined in a CryptoTarget container on one encryption switch, and the path
from host port 2 to target port 2 is defined in a CryptoTarget container on the other encryption
switch. This forms a DEK cluster between encryption switches for both target paths. The DEK
cluster handles the target/host path failover along with the failure of either encryption switch.

Dual fabric deployment - HA and DEK cluster

Figure 89

shows an encryption deployment in a dual fabric SAN. Both fabrics have dual core

directors and several host and target edge switches in a highly redundant core-edge topology.

FIGURE 89

Dual fabric deployment - HA and DEK cluster

Figure 89

shows two paths to the target device, one in each fabric. The host also has a path to

each fabric. There are two encryption switches in each fabric, interconnected through a dedicated
cluster LAN. The Ge1 and Ge0 gigabit Ethernet ports on each of these switches are attached to this
LAN. encryption switches 1 and 3 act as a high availability cluster in fabric 1, providing automatic