Using TDM/xWDM and encryption equipment with MetroCluster IP configurations
Contributors Download PDF of this page
You should be aware of certain considerations for using multiplexing equipment in the MetroCluster IP configuration.
These considerations apply only to direct, dedicated MetroCluster back-end links and switches, not links shared with non-MetroCluster traffic.
The Hardware Universe tool provides some notes about the requirements that TDM/xWDM equipment must meet to work with a MetroCluster IP configuration.
Using encryption on WDM or external encryption devices
When using encryption on WDM devices in the MetroCluster IP configuration, your environment must meet the following requirements:
The external encryption devices or DWDM equipment must have been certified by the vendor with the switch in question.
The certification should cover the operating mode (such as trunking and encryption).
The overall end-to-end latency and jitter, including the encryption, cannot be above the maximum stated in the IMT or in this document.
Any SFPs or QSFPs supported by the equipment vendor are supported for the MetroCluster ISLs. SFPs and QSFPs can be acquired from NetApp or the equipment vendor.
Considerations for ISLs
The ISLs on one fabric should all be the same speed and length.
The ISLs on one fabric should all have the same topology. For example, they should all be direct links, or if the configuration uses WDM, then they should all use WDM.
If you are sharing ISLs with a non-MetroCluster network, you must follow the guidelines in the section Considerations for sharing private layer 2 networks.
The maximum supported difference in distance between fabric 1 and fabric 2 is 20 km.