12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Brocade</strong> Encryption FeaturesDEK clusterThe DEK cluster by definition shares the same data encryption keys asall other encryption devices within a cluster management group. TheDEK cluster is composed of encryption devices that are members ofthe same encryption group. An encryption group contains severalencryption devices that share the same DEKs. For each encryptiongroup, there must be one encryption device designated as the groupleader. The group leader is responsible for functions such as the distributionof the configuration to the other members of the group,authenticating with the key vaults, and configuring CTCs.It is important to note that the DEK cluster offers good redundancy.The loss of one encryption device would not necessarily result in a lossof production, given that disk solutions are implemented using dualpaths. With a dual path, there is always an alternative path for the datato get to the LUN. For this reason, the HA cluster is very seldom used,other than for the most stringent application requirements and environment,where downtime cannot be tolerated and intra-fabricredundancy is required.Figure 6. HA and DEK clusterSecuring Fibre Channel Fabrics 183

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!