HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 200

Multiple paths, one DEK cluster, and two HA clusters

Page 200 highlights

4 Multiple paths, one DEK cluster, and two HA clusters failover for the encryption path between the host and target in fabric 1. Encryption switches 2 and 4 act as a high availability cluster in fabric 2, providing automatic failover for the encryption path between the host and target in fabric 2. All four encryption switches provide an encryption path to the same LUN, and use the same DEK for that LUN, forming a DEK cluster. Multiple paths, one DEK cluster, and two HA clusters Figure 100shows a configuration with a DEK cluster that includes two HA clusters, with multiple paths to the same target device. Management Link Management Link Management Network LAN Host Management Link Management Link CTC2 DEK Cluster Host Port 1 Encryption Switch 2 GE Port(s) HA Cluster1 Encryption Switch 1 Fabric1 Host Port 2 CTC3 Encryption Switch 3 Fabric2 GE Port(s) HA Cluster2 Encryption Switch 4 GE Port(s) CTC1 Target Target Port 2 Port 3 Target Port 1 Target Port 4 CTC4 GE Port(s) IO Sync Link IO Sync Link Target Ecryption Group Dedicated Cluster Network LAN IO Sync Link IO Sync Link DEK Cluster HA Cluster FIGURE 100 Multi-path, DEK cluster and HA cluster 180 Fabric OS Encryption Administrator's Guide 53-1002159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

180
Fabric OS Encryption Administrator’s Guide
53-1002159-03
Multiple paths, one DEK cluster, and two HA clusters
4
failover for the encryption path between the host and target in fabric 1. Encryption switches 2 and
4 act as a high availability cluster in fabric 2, providing automatic failover for the encryption path
between the host and target in fabric 2. All four encryption switches provide an encryption path to
the same LUN, and use the same DEK for that LUN, forming a DEK cluster.
Multiple paths, one DEK cluster, and two HA clusters
Figure 100
shows a configuration with a DEK cluster that includes two HA clusters, with multiple
paths to the same target device.
FIGURE 100
Multi-path, DEK cluster and HA cluster
Target
IO Sync Link
IO Sync Link
IO Sync Link
IO Sync Link
Management Link
Management Link
Management Link
Management Link
Host
Host Port 1
Target
Port 1
GE Port(s)
GE Port(s)
Target
Port 2
Target
Port 4
Target
Port 3
Host Port 2
Encryption
Switch 1
HA Cluster1
Ecryption Group
HA Cluster2
Encryption
Switch 4
Encryption
Switch 3
D
E
K
C
l
u
s
t
e
r
DEK Cluster
HA Cluster
CTC2
CTC1
CTC4
CTC3
Fabric1
Management
Network
LAN
Encryption
Switch 2
Dedicated Cluster
Network
LAN
Fabric2
GE Port(s)
GE Port(s)