Brocade Fabric OS Encryption Administrator’s Guide Support Uživatelský manuál Strana 235

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 332
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 234
Fabric OS Encryption Administrator’s Guide (DPM) 215
53-1002922-01
Dual fabric deployment - HA and DEK cluster
4
In Figure 96, two encryption switches are required, one for each target path. The path from host
port 1 to target port 1 is defined in a CryptoTarget container on one encryption switch, and the path
from host port 2 to target port 2 is defined in a CryptoTarget container on the other encryption
switch. This forms a DEK cluster between encryption switches for both target paths. The DEK
cluster handles the target/host path failover along with the failure of either encryption switch.
Dual fabric deployment - HA and DEK cluster
Figure 97 shows an encryption deployment in a dual fabric SAN. Both fabrics have dual core
directors and several host and target edge switches in a highly redundant core-edge topology.
FIGURE 97 Dual fabric deployment - HA and DEK cluster
Figure 97 shows two paths to the target device, one in each fabric. The host also has a path to each
fabric. There are two encryption switches in each fabric, interconnected through a dedicated
cluster LAN. The Ge1 and Ge0 gigabit Ethernet ports on each of these switches are attached to this
LAN. encryption switches 1 and 3 act as a high availability cluster in fabric 1, providing automatic
Zobrazit stránku 234
1 2 ... 230 231 232 233 234 235 236 237 238 239 240 ... 331 332

Komentáře k této Příručce

Žádné komentáře