Linux version
...................................................................................................................
132
ATTO Macintosh Chap restrictions
.....................................................................................
132
Recommended CHAP policies
...........................................................................................
132
iSCSI session types
..........................................................................................................
132
The iSCSI or iSCSI/FCoE controller CHAP modes
................................................................
132
Enabling single–direction CHAP during discovery and normal session
....................................
132
Enabling CHAP for the iSCSI or iSCSI/FCoE module-discovered iSCSI initiator entry
................
134
Enable CHAP for the Microsoft iSCSI Initiator
.......................................................................
135
Enable CHAP for the open-iscsi iSCSI Initiator
.....................................................................
135
Enabling single–direction CHAP during discovery and bi-directional CHAP during normal session
.....................................................................................................................................
136
Enabling bi-directional CHAP during discovery and single–direction CHAP during normal
session
...........................................................................................................................
138
Enabling bi-directional CHAP during discovery and bi-directional CHAP during normal session...140
Enable CHAP for the open-iscsi iSCSI Initiator
......................................................................
142
iSCSI and FCoE thin provision handling
..............................................................................
144
6 Single path implementation
.....................................................................
149
Installation requirements
........................................................................................................
149
Recommended mitigations
.....................................................................................................
149
Supported configurations
.......................................................................................................
150
General configuration components
.....................................................................................
150
Connecting a single path HBA server to a switch in a fabric zone
..........................................
150
HP-UX configuration
..............................................................................................................
152
Requirements
...................................................................................................................
152
HBA configuration
............................................................................................................
152
Risks
..............................................................................................................................
152
Limitations
.......................................................................................................................
152
Windows Server 2003 (32-bit) ,Windows Server 2008 (32–bit) , and Windows Server 2012 (32–bit)
configurations
......................................................................................................................
153
Requirements
...................................................................................................................
153
HBA configuration
............................................................................................................
153
Risks
..............................................................................................................................
153
Limitations
.......................................................................................................................
154
Windows Server 2003 (64-bit) and Windows Server 2008 (64–bit) configurations
.......................
154
Requirements
...................................................................................................................
154
HBA configuration
............................................................................................................
154
Risks
..............................................................................................................................
155
Limitations
.......................................................................................................................
155
Oracle Solaris configuration
...................................................................................................
155
Requirements
...................................................................................................................
155
HBA configuration
............................................................................................................
156
Risks
..............................................................................................................................
156
Limitations
.......................................................................................................................
156
OpenVMS configuration
........................................................................................................
157
Requirements
...................................................................................................................
157
HBA configuration
............................................................................................................
157
Risks
..............................................................................................................................
157
Limitations
.......................................................................................................................
158
Xen configuration
.................................................................................................................
158
Requirements
...................................................................................................................
158
HBA configuration
............................................................................................................
158
Risks
..............................................................................................................................
159
Limitations
.......................................................................................................................
159
Linux (32-bit) configuration
.....................................................................................................
159
Contents
7