HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 160

engine of encryption switch 1. Refer to

Page 160 highlights

3 Configuring a multi-path Crypto LUN FIGURE 57 A LUN accessible through multiple paths The following steps may be used to configure multiple path access to the LUN in Figure 57. 1. Create zoning between host port 1 and target port 1. Refer to the section "Creating an initiator - target zone" on page 118 for instructions. 2. Create zoning between host port 2 and target port 2. Refer to the section "Creating an initiator - target zone" on page 118 for instructions. 3. On the group leader encryption switch (switch 1), create a CryptoTarget container for each target port and add the hosts in sequence. Do NOT commit the configuration until you have created all CryptoTarget containers and added all hosts to the respective containers. a. Create a CryptoTarget container (CTC1) for target port 1 to be hosted on the encryption engine of encryption switch 1. Refer to the section "Creating a CryptoTarget container" on page 123 for instructions on steps b. through e. FabricAdmin:switch>cryptocfg --create -container disk CTC1 \ 0 b. Create a CryptoTarget container (CTC2) for target port 2 to be hosted on the encryption engine of encryption switch 2. FabricAdmin:switch>cryptocfg --create -container disk CTC2 \ 0 142 Fabric OS Encryption Administrator's Guide 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

142
Fabric OS Encryption Administrator’s Guide
53-1001864-01
Configuring a multi-path Crypto LUN
3
FIGURE 57
A LUN accessible through multiple paths
The following steps may be used to configure multiple path access to the LUN in
Figure 57
.
1.
Create zoning between host port 1 and target port 1. Refer to the section
“Creating an initiator
- target zone”
on page 118 for instructions.
2.
Create zoning between host port 2 and target port 2. Refer to the section
“Creating an initiator
- target zone”
on page 118 for instructions.
3.
On the group leader encryption switch (switch 1), create a CryptoTarget container for each
target port and add the hosts in sequence. Do NOT commit the configuration until you have
created all CryptoTarget containers and added all hosts to the respective containers.
a.
Create a CryptoTarget container (CTC1) for target port 1 to be hosted on the encryption
engine of encryption switch 1. Refer to the section
“Creating a CryptoTarget container”
on
page 123 for instructions on steps b. through e.
FabricAdmin:switch>
cryptocfg
--create -container disk CTC1 \
<switch 1 WWN> 0 <Target Port 1 WWN> <Target NWWN>
b.
Create a CryptoTarget container (CTC2) for target port 2 to be hosted on the encryption
engine of encryption switch 2.
FabricAdmin:switch>
cryptocfg --create -container disk
CTC2 \
<switch 2 WWN> 0 <Target Port2 WWN> <Target NWWN>