12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 11: <strong>Brocade</strong> Data Encryption Productsport target but it can have multiple initiators or hosts associated withit. A CTC can also have several LUNs behind the storage port in theCTC. Furthermore, once a storage port has been assigned to a CTC, itcannot exist or be defined in another CTC. Essentially, this forces alltraffic that goes through a specific storage port to be encrypted and togo through the same encryption device.NOTE: The storage port can still be made accessible (with appropriatezoning) for other hosts in case encryption is not required for theirLUNs. In this case, these LUNs are not added to the CTC.First-Time Encryption and RekeyingThe first-time encryption (FTE) process can generally be performed usingtwo methods. The first is to copy the original cleartext data on the productionLUN to a second LUN with an equivalent amount of disk space whileencrypting the data at the same time. This method obviously requires anequivalent amount of disk space, which may or may not be available. Furthermore,once the data is copied to the new LUN, the servers must nowpoint to it, which requires rebuilding the device tree on the server and mayresult in disruption of the production environment.The other method, which is implemented by the <strong>Brocade</strong> encryptionsolution, is to perform the FTE in-place on the same LUN. The processinvolves reading the first logical block on the LUN (which is in cleartext),encrypting it, and then writing it back to its original location asciphertext. Subsequent blocks are encrypted in the same mannersequentially until all blocks in the LUN have been encrypted. This processcan be performed offline or online, depending on anorganization's business requirements.Figure 45 illustrates the FTE process.Hostp 1 d 0 u 1 0 1 cleartextj 1 d 0 u 1 0 1g 1 d 0 u 1 0 1$ 1 0 2 8 . 0 6Reads cleartext from LB0StorageLB =logicalblock<strong>Brocade</strong>EncryptionSwitchWrites ciphertext to LB00 1 0 0 1 1 0 11 1 0 0 1 1 0 10 1 0 0 1 1 0 1ciphertext0 1 0 1 1 1 0 0LUNLB0 01011100LB1 10010110LB2 00110110..LBn $1028.06Figure 5. First-time encryption operation180 Securing Fibre Channel Fabrics

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!