HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 199
Dual fabric deployment - HA and DEK cluster,
![]() |
View all HP Brocade 8/12c manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 199 highlights
Dual fabric deployment - HA and DEK cluster 4 In Figure 98, two encryption switches are required, one for each target path. The path from host port 1 to target port 1 is defined in a CryptoTarget container on one encryption switch, and the path from host port 2 to target port 2 is defined in a CryptoTarget container on the other encryption switch. This forms a DEK cluster between encryption switches for both target paths. The DEK cluster handles the target/host path failover along with the failure of either encryption switch. Dual fabric deployment - HA and DEK cluster Figure 99 shows an encryption deployment in a dual fabric SAN. Both fabrics have dual core directors and several host and target edge switches in a highly redundant core-edge topology. FIGURE 99 Dual fabric deployment - HA and DEK cluster Figure 99 shows two paths to the target device, one in each fabric. The host also has a path to each fabric. There are two encryption switches in each fabric, interconnected through a dedicated cluster LAN. The Ge1 and Ge0 gigabit Ethernet ports on each of these switches are attached to this LAN. encryption switches 1 and 3 act as a high availability cluster in fabric 1, providing automatic Fabric OS Encryption Administrator's Guide 179 53-1002159-03
![](/manual_guide/products/hewlettpackard-brocade-812c-fabric-os-encryption-administrator039s-guide-2e9e911/199.png)