HP EVA P6000 User Manual page 7

Enterprise virtual array
Hide thumbs Also See for EVA P6000:
Table of Contents

Advertisement

6 Single path implementation.....................................................................132
Installation requirements........................................................................................................132
Recommended mitigations.....................................................................................................132
Supported configurations.......................................................................................................133
General configuration components.....................................................................................133
Connecting a single path HBA server to a switch in a fabric zone..........................................133
HP-UX configuration..............................................................................................................135
Requirements...................................................................................................................135
HBA configuration............................................................................................................135
Risks..............................................................................................................................135
Limitations.......................................................................................................................135
Requirements...................................................................................................................136
HBA configuration............................................................................................................136
Risks..............................................................................................................................136
Limitations.......................................................................................................................137
Requirements...................................................................................................................137
HBA configuration............................................................................................................137
Risks..............................................................................................................................138
Limitations.......................................................................................................................138
Oracle Solaris configuration...................................................................................................138
Requirements...................................................................................................................138
HBA configuration............................................................................................................139
Risks..............................................................................................................................139
Limitations.......................................................................................................................139
OpenVMS configuration........................................................................................................140
Requirements...................................................................................................................140
HBA configuration............................................................................................................140
Risks..............................................................................................................................140
Limitations.......................................................................................................................141
Xen configuration.................................................................................................................141
Requirements...................................................................................................................141
HBA configuration............................................................................................................141
Risks..............................................................................................................................142
Limitations.......................................................................................................................142
Linux (32-bit) configuration.....................................................................................................142
Requirements...................................................................................................................142
HBA configuration............................................................................................................143
Risks..............................................................................................................................143
Limitations.......................................................................................................................143
Linux (Itanium) configuration...................................................................................................143
Requirements...................................................................................................................143
HBA configuration............................................................................................................144
Risks..............................................................................................................................144
Limitations.......................................................................................................................144
IBM AIX configuration...........................................................................................................145
Requirements...................................................................................................................145
HBA configuration............................................................................................................145
Risks..............................................................................................................................145
Limitations.......................................................................................................................145
VMware configuration...........................................................................................................146
Requirements...................................................................................................................146
HBA configuration............................................................................................................146
Contents
7

Advertisement

Table of Contents
loading

This manual is also suitable for:

Eva p6300Eva p6500

Table of Contents