Benefits at a glance..............................................................................................................150
Installation requirements........................................................................................................151
Recommended mitigations.....................................................................................................151
Supported configurations.......................................................................................................151
General configuration components.....................................................................................151
Connecting a single path HBA server to a switch in a fabric zone..........................................151
HP-UX configuration.........................................................................................................153
Requirements..............................................................................................................153
HBA configuration.......................................................................................................153
Risks..........................................................................................................................153
Limitations..................................................................................................................153
Windows Server (32-bit) configuration................................................................................154
Requirements..............................................................................................................154
HBA configuration.......................................................................................................154
Risks..........................................................................................................................154
Limitations..................................................................................................................154
Windows Server (64-bit) configuration................................................................................155
Requirements..............................................................................................................155
HBA configuration.......................................................................................................155
Risks..........................................................................................................................155
Limitations..................................................................................................................155
SUN Solaris configuration.................................................................................................156
Requirements..............................................................................................................156
HBA configuration.......................................................................................................156
Risks..........................................................................................................................156
Limitations..................................................................................................................157
Tru64 UNIX configuration.................................................................................................157
Requirements..............................................................................................................157
HBA configuration.......................................................................................................157
Risks..........................................................................................................................158
OpenVMS configuration...................................................................................................158
Requirements..............................................................................................................158
HBA configuration.......................................................................................................158
Risks..........................................................................................................................159
Limitations..................................................................................................................159
Linux (32-bit) configuration................................................................................................159
Requirements..............................................................................................................159
HBA configuration.......................................................................................................159
Risks..........................................................................................................................160
Limitations..................................................................................................................160
Linux (64-bit) configuration................................................................................................160
Requirements..............................................................................................................160
HBA configuration.......................................................................................................160
Risks..........................................................................................................................161
Limitations..................................................................................................................161
IBM AIX configuration......................................................................................................161
Requirements..............................................................................................................161
HBA configuration.......................................................................................................161
Risks..........................................................................................................................162
Limitations..................................................................................................................162
VMware configuration......................................................................................................162
Requirements..............................................................................................................162
HBA configuration.......................................................................................................163
Risks..........................................................................................................................163
Limitations..................................................................................................................163
10 Contents