Srdf pairs – Brocade Fabric OS Encryption Administrator’s Guide Supporting RSA Data Protection Manager (DPM) Environments (Supporting Fabric OS v7.2.0) User Manual

Page 200

Advertising
background image

180

Fabric OS Encryption Administrator’s Guide (DPM)

53-1002922-01

SRDF LUNs

3

Adaptive Copy Replication transfers data from the source devices to the remote devices
without waiting for an acknowledgment. This is especially useful when transferring large
amounts of data during data center migrations, consolidations, and in data mobility
environments.

Asynchronous Replication places host writes into chunks and then transfers an entire chunk to
the target system. When a complete chunk is received on the target system, the copy cycle is
committed. If the SRDF links are lost during data transfer, any partial chunk is discarded,
preserving consistency on the target system. This method provides a consistent point-in-time
remote image that is not far behind the source system and results in minimal data loss if there
is a disaster at the source site.

SRDF pairs

Remote replication is implemented by establishing a synchronized pair of SRDF devices connected
by FC or IP links. A local source device is paired with a remote target device while data replication is
occurring. While the SRDF devices are paired, the remote target device is not locally accessible for
read or write operations. When the data replication operation is completed, the pair may be split to
enable normal read/write access to both devices. The pair may be restored to restore the data on
the local source device.

Figure 92

shows the placement of Brocade Encryption Switches in an SRDF configuration. When

encryption is enabled for the R1 LUN, encrypted data written by the local application server to the
R1 LUN is replicated on the R2 LUN. The data is encrypted using a DEK that was generated on the
local encryption switch and stored on the local key vault. When each site has an independent key
vault, the key vaults must be synchronized to ensure the availability of the DEK at the remote site.
Both sites may share the same key vault, which eliminates the need for synchronization across
sites. Depending on distance between sites, sharing a key vault might add some latency when
retrieving a key.

FIGURE 92

Brocade Encryption Switches in an SRDF Configuration

Advertising