Brocade Communications Systems Encryption Switch Service Manual Page 239

  • Download
  • Add to my manuals
  • Print
  • Page
    / 326
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 238
Fabric OS Encryption Administrator’s Guide (DPM) 221
53-1002720-02
Data mirroring deployment
4
Data mirroring deployment
Figure 104 shows a data mirroring deployment. In this configuration, the host only knows about
target1 and LUN1, and the I/O path to target1 and LUN1. When data is sent to target1, it is written
to LUN1, and also sent on to LUN2 for replication. Target1 acts as an initiator to enable the
replication I/O path. When an encryption switch is added to the configuration, it introduces another
virtual target and LUN, and a virtual initiator in the I/O path in front of target1. The virtual target
and LUN provided by the encryption switch is mapped to target1 and LUN1. Data is encrypted and
the cipher text is sent to target1, written to LUN1, and replicated on LUN2.
Only one DEK is used to create the cipher text written to both LUNs. A key ID is stored in metadata
written to both LUNs. If possible, the metadata is written to every block with the LBA range of 1 to
16. This ensures that the encryption engine will be able to retrieve the correct DEK from the key
vault when retrieving data from either LUN1 or LUN2.
FIGURE 104 Data mirroring deployment
Page view 238
1 2 ... 234 235 236 237 238 239 240 241 242 243 244 ... 325 326

Comments to this Manuals

No comments