HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 187

engine of encryption switch 1. Refer to

Page 187 highlights

Configuring a multi-path Crypto LUN 3 FIGURE 95 A LUN accessible through multiple paths The following steps may be used to configure multiple path access to the LUN in Figure 95. 1. Create zoning between host port 1 and target port 1. Refer to the section "Creating an initiator - target zone" on page 145 for instructions. 2. Create zoning between host port 2 and target port 2. Refer to the section "Creating an initiator - target zone" on page 145 for instructions. 3. On the group leader encryption switch (switch 1), create a CryptoTarget container for each target port and add the hosts in sequence. Do NOT commit the configuration until you have created all CryptoTarget containers and added all hosts to the respective containers. a. Create a CryptoTarget container (CTC1) for target port 1 to be hosted on the encryption engine of encryption switch 1. Refer to the section "Creating a CryptoTarget container" on page 149 for instructions on steps b. through e. FabricAdmin:switch>cryptocfg --create -container disk CTC1 \ 0 b. Create a CryptoTarget container (CTC2) for target port 2 to be hosted on the encryption engine of encryption switch 2. FabricAdmin:switch>cryptocfg --create -container disk CTC2 \ 0 Fabric OS Encryption Administrator's Guide 167 53-1002159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

Fabric OS Encryption Administrator’s Guide
167
53-1002159-03
Configuring a multi-path Crypto LUN
3
FIGURE 95
A LUN accessible through multiple paths
The following steps may be used to configure multiple path access to the LUN in
Figure 95
.
1.
Create zoning between host port 1 and target port 1. Refer to the section
“Creating an initiator
- target zone”
on page 145 for instructions.
2.
Create zoning between host port 2 and target port 2. Refer to the section
“Creating an initiator
- target zone”
on page 145 for instructions.
3.
On the group leader encryption switch (switch 1), create a CryptoTarget container for each
target port and add the hosts in sequence. Do NOT commit the configuration until you have
created all CryptoTarget containers and added all hosts to the respective containers.
a.
Create a CryptoTarget container (CTC1) for target port 1 to be hosted on the encryption
engine of encryption switch 1. Refer to the section
“Creating a CryptoTarget container”
on
page 149 for instructions on steps b. through e.
FabricAdmin:switch>
cryptocfg
--create -container disk CTC1 \
<switch 1 WWN> 0 <Target Port 1 WWN> <Target NWWN>
b.
Create a CryptoTarget container (CTC2) for target port 2 to be hosted on the encryption
engine of encryption switch 2.
FabricAdmin:switch>
cryptocfg --create -container disk
CTC2 \
<switch 2 WWN> 0 <Target Port2 WWN> <Target NWWN>