Benefits at a glance
..............................................................................................................
150
Installation requirements
........................................................................................................
151
Recommended mitigations
.....................................................................................................
151
Supported configurations
.......................................................................................................
151
General configuration components
.....................................................................................
151
Connecting a single path HBA server to a switch in a fabric zone
..........................................
151
HP-UX configuration
.........................................................................................................
153
Requirements
..............................................................................................................
153
HBA configuration
.......................................................................................................
153
Risks
..........................................................................................................................
153
Limitations
..................................................................................................................
153
Windows Server (32-bit) configuration
................................................................................
154
Requirements
..............................................................................................................
154
HBA configuration
.......................................................................................................
154
Risks
..........................................................................................................................
154
Limitations
..................................................................................................................
154
Windows Server (64-bit) configuration
................................................................................
155
Requirements
..............................................................................................................
155
HBA configuration
.......................................................................................................
155
Risks
..........................................................................................................................
155
Limitations
..................................................................................................................
155
SUN Solaris configuration
.................................................................................................
156
Requirements
..............................................................................................................
156
HBA configuration
.......................................................................................................
156
Risks
..........................................................................................................................
156
Limitations
..................................................................................................................
157
Tru64 UNIX configuration
.................................................................................................
157
Requirements
..............................................................................................................
157
HBA configuration
.......................................................................................................
157
Risks
..........................................................................................................................
158
OpenVMS configuration
...................................................................................................
158
Requirements
..............................................................................................................
158
HBA configuration
.......................................................................................................
158
Risks
..........................................................................................................................
159
Limitations
..................................................................................................................
159
Linux (32-bit) configuration
................................................................................................
159
Requirements
..............................................................................................................
159
HBA configuration
.......................................................................................................
159
Risks
..........................................................................................................................
160
Limitations
..................................................................................................................
160
Linux (64-bit) configuration
................................................................................................
160
Requirements
..............................................................................................................
160
HBA configuration
.......................................................................................................
160
Risks
..........................................................................................................................
161
Limitations
..................................................................................................................
161
IBM AIX configuration
......................................................................................................
161
Requirements
..............................................................................................................
161
HBA configuration
.......................................................................................................
161
Risks
..........................................................................................................................
162
Limitations
..................................................................................................................
162
VMware configuration
......................................................................................................
162
Requirements
..............................................................................................................
162
HBA configuration
.......................................................................................................
163
Risks
..........................................................................................................................
163
Limitations
..................................................................................................................
163
10
Contents