HP 6100 User Manual page 10

Enterprise virtual array
Hide thumbs Also See for 6100:
Table of Contents

Advertisement

Benefits at a glance..............................................................................................................150
Installation requirements........................................................................................................151
Recommended mitigations.....................................................................................................151
Supported configurations.......................................................................................................151
General configuration components.....................................................................................151
Connecting a single path HBA server to a switch in a fabric zone..........................................151
HP-UX configuration.........................................................................................................153
Requirements..............................................................................................................153
HBA configuration.......................................................................................................153
Risks..........................................................................................................................153
Limitations..................................................................................................................153
Windows Server (32-bit) configuration................................................................................154
Requirements..............................................................................................................154
HBA configuration.......................................................................................................154
Risks..........................................................................................................................154
Limitations..................................................................................................................154
Windows Server (64-bit) configuration................................................................................155
Requirements..............................................................................................................155
HBA configuration.......................................................................................................155
Risks..........................................................................................................................155
Limitations..................................................................................................................155
SUN Solaris configuration.................................................................................................156
Requirements..............................................................................................................156
HBA configuration.......................................................................................................156
Risks..........................................................................................................................156
Limitations..................................................................................................................157
Tru64 UNIX configuration.................................................................................................157
Requirements..............................................................................................................157
HBA configuration.......................................................................................................157
Risks..........................................................................................................................158
OpenVMS configuration...................................................................................................158
Requirements..............................................................................................................158
HBA configuration.......................................................................................................158
Risks..........................................................................................................................159
Limitations..................................................................................................................159
Linux (32-bit) configuration................................................................................................159
Requirements..............................................................................................................159
HBA configuration.......................................................................................................159
Risks..........................................................................................................................160
Limitations..................................................................................................................160
Linux (64-bit) configuration................................................................................................160
Requirements..............................................................................................................160
HBA configuration.......................................................................................................160
Risks..........................................................................................................................161
Limitations..................................................................................................................161
IBM AIX configuration......................................................................................................161
Requirements..............................................................................................................161
HBA configuration.......................................................................................................161
Risks..........................................................................................................................162
Limitations..................................................................................................................162
VMware configuration......................................................................................................162
Requirements..............................................................................................................162
HBA configuration.......................................................................................................163
Risks..........................................................................................................................163
Limitations..................................................................................................................163
10
Contents

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Eva4000Eva6000Eva8000Eva4100Eva6100Eva8100

Table of Contents