Dual fabric deployment - ha and dek cluster – Brocade Fabric OS Encryption Administrator’s Guide Supporting RSA Data Protection Manager (DPM) Environments (Supporting Fabric OS v7.2.0) User Manual

Page 235

Advertising
background image

Fabric OS Encryption Administrator’s Guide (DPM)

215

53-1002922-01

Dual fabric deployment - HA and DEK cluster

4

In

Figure 96

, two encryption switches are required, one for each target path. The path from host

port 1 to target port 1 is defined in a CryptoTarget container on one encryption switch, and the path
from host port 2 to target port 2 is defined in a CryptoTarget container on the other encryption
switch. This forms a DEK cluster between encryption switches for both target paths. The DEK
cluster handles the target/host path failover along with the failure of either encryption switch.

Dual fabric deployment - HA and DEK cluster

Figure 97

shows an encryption deployment in a dual fabric SAN. Both fabrics have dual core

directors and several host and target edge switches in a highly redundant core-edge topology.

FIGURE 97

Dual fabric deployment - HA and DEK cluster

Figure 97

shows two paths to the target device, one in each fabric. The host also has a path to each

fabric. There are two encryption switches in each fabric, interconnected through a dedicated
cluster LAN. The Ge1 and Ge0 gigabit Ethernet ports on each of these switches are attached to this
LAN. encryption switches 1 and 3 act as a high availability cluster in fabric 1, providing automatic

Advertising