HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 173
Dual fabric deployment - HA and DEK cluster,
View all HP 8/8 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 173 highlights
Dual fabric deployment - HA and DEK cluster 4 In Figure 60, two encryption switches are required, one for each target path. The path from host port 1 to target port 1 is defined in a CryptoTarget container on one encryption switch, and the path from host port 2 to target port 2 is defined in a CryptoTarget container on the other encryption switch. This forms a DEK cluster between encryption switches for both target paths. Please note that configuring an HA cluster between the two encryption switches in the above configuration is not supported. The DEK cluster handles the target/host path failover along with the failure of either encryption switch. Dual fabric deployment - HA and DEK cluster Figure 61 shows an encryption deployment in a dual fabric SAN. Both fabrics have dual core directors and several host and target edge switches in a highly redundant core-edge topology. FIGURE 61 Dual fabric deployment - HA and DEK cluster Figure 61 shows two paths to the target device, one in each fabric. The host also has a path to each fabric. There are two encryption switches in each fabric, interconnected through a dedicated cluster LAN. The Ge1 and Ge0 gigabit Ethernet ports on each of these switches are attached to this LAN. encryption switches 1 and 3 act as a high availability cluster in fabric 1, providing automatic Fabric OS Encryption Administrator's Guide 155 53-1001864-01