HP 6100 HP 4x00/6x00/8x00 Enterprise Virtual Array User Guide (5697-0733, Marc - Page 10

SUN Solaris configuration, IBM AIX configuration

Page 10 highlights

Benefits at a glance...150 Installation requirements...151 Recommended mitigations...151 Supported configurations...151 General configuration components 151 Connecting a single path HBA server to a switch in a fabric zone 151 HP-UX configuration...153 Requirements...153 HBA configuration...153 Risks...153 Limitations...153 Windows Server (32-bit) configuration 154 Requirements...154 HBA configuration...154 Risks...154 Limitations...154 Windows Server (64-bit) configuration 155 Requirements...155 HBA configuration...155 Risks...155 Limitations...155 SUN Solaris configuration 156 Requirements...156 HBA configuration...156 Risks...156 Limitations...157 Tru64 UNIX configuration 157 Requirements...157 HBA configuration...157 Risks...158 OpenVMS configuration 158 Requirements...158 HBA configuration...158 Risks...159 Limitations...159 Linux (32-bit) configuration 159 Requirements...159 HBA configuration...159 Risks...160 Limitations...160 Linux (64-bit) configuration 160 Requirements...160 HBA configuration...160 Risks...161 Limitations...161 IBM AIX configuration...161 Requirements...161 HBA configuration...161 Risks...162 Limitations...162 VMware configuration...162 Requirements...162 HBA configuration...163 Risks...163 Limitations...163 10 Contents

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185

Benefits at a glance
..............................................................................................................
150
Installation requirements
........................................................................................................
151
Recommended mitigations
.....................................................................................................
151
Supported configurations
.......................................................................................................
151
General configuration components
.....................................................................................
151
Connecting a single path HBA server to a switch in a fabric zone
..........................................
151
HP-UX configuration
.........................................................................................................
153
Requirements
..............................................................................................................
153
HBA configuration
.......................................................................................................
153
Risks
..........................................................................................................................
153
Limitations
..................................................................................................................
153
Windows Server (32-bit) configuration
................................................................................
154
Requirements
..............................................................................................................
154
HBA configuration
.......................................................................................................
154
Risks
..........................................................................................................................
154
Limitations
..................................................................................................................
154
Windows Server (64-bit) configuration
................................................................................
155
Requirements
..............................................................................................................
155
HBA configuration
.......................................................................................................
155
Risks
..........................................................................................................................
155
Limitations
..................................................................................................................
155
SUN Solaris configuration
.................................................................................................
156
Requirements
..............................................................................................................
156
HBA configuration
.......................................................................................................
156
Risks
..........................................................................................................................
156
Limitations
..................................................................................................................
157
Tru64 UNIX configuration
.................................................................................................
157
Requirements
..............................................................................................................
157
HBA configuration
.......................................................................................................
157
Risks
..........................................................................................................................
158
OpenVMS configuration
...................................................................................................
158
Requirements
..............................................................................................................
158
HBA configuration
.......................................................................................................
158
Risks
..........................................................................................................................
159
Limitations
..................................................................................................................
159
Linux (32-bit) configuration
................................................................................................
159
Requirements
..............................................................................................................
159
HBA configuration
.......................................................................................................
159
Risks
..........................................................................................................................
160
Limitations
..................................................................................................................
160
Linux (64-bit) configuration
................................................................................................
160
Requirements
..............................................................................................................
160
HBA configuration
.......................................................................................................
160
Risks
..........................................................................................................................
161
Limitations
..................................................................................................................
161
IBM AIX configuration
......................................................................................................
161
Requirements
..............................................................................................................
161
HBA configuration
.......................................................................................................
161
Risks
..........................................................................................................................
162
Limitations
..................................................................................................................
162
VMware configuration
......................................................................................................
162
Requirements
..............................................................................................................
162
HBA configuration
.......................................................................................................
163
Risks
..........................................................................................................................
163
Limitations
..................................................................................................................
163
10
Contents