beautypg.com

6 single path implementation – HP EVA P6000 Storage User Manual

Page 7

background image

Linux version...................................................................................................................132
ATTO Macintosh Chap restrictions .....................................................................................132
Recommended CHAP policies ...........................................................................................132
iSCSI session types ..........................................................................................................132
The iSCSI or iSCSI/FCoE controller CHAP modes ................................................................132
Enabling single–direction CHAP during discovery and normal session....................................132
Enabling CHAP for the iSCSI or iSCSI/FCoE module-discovered iSCSI initiator entry ................134
Enable CHAP for the Microsoft iSCSI Initiator.......................................................................135
Enable CHAP for the open-iscsi iSCSI Initiator .....................................................................135
Enabling single–direction CHAP during discovery and bi-directional CHAP during normal session
.....................................................................................................................................136
Enabling bi-directional CHAP during discovery and single–direction CHAP during normal
session...........................................................................................................................138
Enabling bi-directional CHAP during discovery and bi-directional CHAP during normal session...140
Enable CHAP for the open-iscsi iSCSI Initiator......................................................................142
iSCSI and FCoE thin provision handling..............................................................................144

6 Single path implementation.....................................................................149

Installation requirements........................................................................................................149
Recommended mitigations.....................................................................................................149
Supported configurations.......................................................................................................150

General configuration components.....................................................................................150
Connecting a single path HBA server to a switch in a fabric zone..........................................150

HP-UX configuration..............................................................................................................152

Requirements...................................................................................................................152
HBA configuration............................................................................................................152
Risks..............................................................................................................................152
Limitations.......................................................................................................................152

Windows Server 2003 (32-bit) ,Windows Server 2008 (32–bit) , and Windows Server 2012 (32–bit)
configurations......................................................................................................................153

Requirements...................................................................................................................153
HBA configuration............................................................................................................153
Risks..............................................................................................................................153
Limitations.......................................................................................................................154

Windows Server 2003 (64-bit) and Windows Server 2008 (64–bit) configurations.......................154

Requirements...................................................................................................................154
HBA configuration............................................................................................................154
Risks..............................................................................................................................155
Limitations.......................................................................................................................155

Oracle Solaris configuration...................................................................................................155

Requirements...................................................................................................................155
HBA configuration............................................................................................................156
Risks..............................................................................................................................156
Limitations.......................................................................................................................156

OpenVMS configuration........................................................................................................157

Requirements...................................................................................................................157
HBA configuration............................................................................................................157
Risks..............................................................................................................................157
Limitations.......................................................................................................................158

Xen configuration.................................................................................................................158

Requirements...................................................................................................................158
HBA configuration............................................................................................................158
Risks..............................................................................................................................159
Limitations.......................................................................................................................159

Linux (32-bit) configuration.....................................................................................................159

Contents

7