HPE Nimble Storage Deployment Considerations For Networking
HPE Nimble Storage Deployment Considerations For Networking
CONTENTS
Executive summary .............................................................................................................................................................................................................................................................................................................. 3
Target audience................................................................................................................................................................................................................................................................................................................ 3
Modifying the network configuration .................................................................................................................................................................................................................................................................. 3
Requirements for network configuration ................................................................................................................................................................................................................................................... 3
Recommendations for network configuration....................................................................................................................................................................................................................................... 3
Warnings for network configuration .............................................................................................................................................................................................................................................................. 4
iSCSI considerations ...................................................................................................................................................................................................................................................................................................... 4
Virtual local area networks ............................................................................................................................................................................................................................................................................................ 4
Requirements for VLANs ......................................................................................................................................................................................................................................................................................... 4
Recommendations for VLANs ............................................................................................................................................................................................................................................................................. 4
Warnings for VLANs ..................................................................................................................................................................................................................................................................................................... 5
Maximum transmission units ...................................................................................................................................................................................................................................................................................... 5
Requirements for MTUs ............................................................................................................................................................................................................................................................................................ 5
Recommendations for MTUs................................................................................................................................................................................................................................................................................ 5
Warnings for MTUs........................................................................................................................................................................................................................................................................................................ 5
Inter-switch links ..................................................................................................................................................................................................................................................................................................................... 5
Requirements for ISLs ................................................................................................................................................................................................................................................................................................. 5
Recommendations for ISLs..................................................................................................................................................................................................................................................................................... 6
Warnings for ISLs............................................................................................................................................................................................................................................................................................................. 6
Switch characteristics ......................................................................................................................................................................................................................................................................................................... 6
Requirements for switches...................................................................................................................................................................................................................................................................................... 6
Recommendations for switches ......................................................................................................................................................................................................................................................................... 6
Warnings for switches ................................................................................................................................................................................................................................................................................................. 7
Host characteristics.............................................................................................................................................................................................................................................................................................................. 7
Requirements for hosts.............................................................................................................................................................................................................................................................................................. 7
Recommendations for hosts.................................................................................................................................................................................................................................................................................. 7
Warnings for hosts ......................................................................................................................................................................................................................................................................................................... 8
Multiarray group considerations .............................................................................................................................................................................................................................................................................. 8
Requirements for multiarray groups.............................................................................................................................................................................................................................................................. 8
Recommendations for multiarray groups.................................................................................................................................................................................................................................................. 8
Warnings for multiarray groups ......................................................................................................................................................................................................................................................................... 8
Subnet considerations ....................................................................................................................................................................................................................................................................................................... 9
Requirements for subnets ....................................................................................................................................................................................................................................................................................... 9
Recommendations for subnets ........................................................................................................................................................................................................................................................................... 9
Warnings for subnets ................................................................................................................................................................................................................................................................................................... 9
Assigning ports to different subnet types ................................................................................................................................................................................................................................................ 9
Management subnets ........................................................................................................................................................................................................................................................................................................ 9
Requirements for management subnets ................................................................................................................................................................................................................................................10
Recommendations for management subnets .................................................................................................................................................................................................................................... 10
Warnings for management subnets ............................................................................................................................................................................................................................................................10
Considerations for configuring the management interface ...................................................................................................................................................................................................10
Technical white paper
EXECUTIVE SUMMARY
HPE Nimble Storage arrays are designed with redundant controllers that provide continuous access to your storage if the active controller
fails. Ethernet connectivity to the HPE Nimble Storage array supports this continuous access by enabling redundant network connectivity
and flexible architecture. Proper network configuration of the HPE Nimble Storage array enables high availability and supports uninterrupted
access to monitoring functions and array data.
This deployment considerations guide describes best practices for properly connecting your HPE Nimble Storage arrays to achieve optimal
performance and availability. Where applicable, each discussion is followed by lists of requirements, recommendations, and warnings. A
glossary at the end of the document further explains many of the terms used throughout the guide.
The guide supplements the CLI Administration Guide and the GUI Administration Guide, which are located on the HPE InfoSight portal.
Although it describes general deployment considerations and best practices in detail, it is not meant to be exhaustive and does not cover
every possible supported configuration.
NOTE
Some recommendations in this document might be superseded by those from another document about a specific solution or product. If you
are unsure of your networking needs, contact HPE Nimble Storage technical support for further assistance.
Target audience
The target audience for this document includes anyone who has questions related to best practices or is looking for additional
recommendations on how to connect an HPE Nimble Storage array to an Ethernet network. Readers should be familiar with Ethernet
connectivity concepts and with the needs and requirements of their organization and its network infrastructure.
For more information about how to create a draft configuration and manage the network configuration, see the “Network Configuration
Profiles” section of the CLI Administration Guide or the GUI Administration Guide. Be sure to review the steps necessary to modify the
network configuration for your specific version of NimbleOS.
IMPORTANT
Failure to verify a match between the configurations and the cabling might result in a loss of access or inability to connect to the array.
• Do not configure interfaces to reside on the same subnet if the interfaces are unable to communicate with each other. Some IP addresses
can be assigned to any physical interface in a subnet; therefore, all interfaces must be equally reachable.
iSCSI considerations
The iSCSI protocol is a block storage protocol with specific dependencies on adequate response times, throughput, and latency. The iSCSI
protocol does not prohibit the routing of iSCSI traffic, as long as the network infrastructure can provide sufficiently high throughput and low
latency. The following guidelines apply to iSCSI networks:
• Keep the number of network hops to a minimum.
• Avoid the use of slow WAN links.
– Choose wirespeed Layer 3 switching in preference to traditional routers.
• Be aware that iSCSI is particularly sensitive to high rates of packet loss.
– WAN links (which Hewlett Packard Enterprise does not recommend using) must have sufficient guaranteed bandwidth.
– Switches, routers, firewalls, and other devices in the communication path must have sufficient resources available, including CPU,
system memory, and packet buffer memory.
Setting the switch MTU to a value higher than the MTU value on the host or initiator does not cause problems. Only when the intermediate
device (switch) is set lower than one or both of the end devices does the switch MTU setting cause problems.
INTER-SWITCH LINKS
If devices on multiple switches must be able to communicate with each other, the switches are usually connected to each other through one
or more Ethernet cables in what is often referred to as an inter-switch link (ISL). The configuration of the ISL is critical when subnets are
configured to span multiple switches.
SWITCH CHARACTERISTICS
Hewlett Packard Emterprise does not recommend specific Ethernet cables or switches; however, HPE Nimble Storage technical support can
tell you whether any problems have been documented for a specific cable or switch model.
When choosing an iSCSI switch, consider the features listed in the following table.
TABLE 1. Considerations for iSCSI switch features
Feature Considerations
Nonblocking architecture A switch that is used for iSCSI data communication should have a backplane that provides enough bandwidth to support full-
duplex connectivity for all ports at the same time. For example, a 24-port gigabit switch backplane should provide at least 48
Gigabits per second (Gbps) of bandwidth (or 1 Gbps × 2 for full duplex × 24 ports).
Flow control (802.3x) Flow control provides a mechanism for temporarily pausing the transmission of data on Ethernet network interfaces when a
sending node transmits data faster than the receiving node can accept it. Whenever possible, flow control should be enabled on
all host, switch, and array ports to provide graceful communication between network nodes. HPE Nimble Storage arrays
automatically enable flow control if the switch supports autonegotiation of Ethernet Flow Control.
Buffer space per switch port Ethernet switches have a dedicated memory pool (buffer) to briefly store received packets while they are being evaluated and
forwarded. Heavier sustained workloads require switches with more buffer space. Because buffer-allocation algorithms differ
between switch products, there are no reliable guidelines for the minimum amount of buffer space required.
Support for jumbo frames Ethernet frames larger than 1514 bytes (1518 with VLAN tagging) are typically referred to as jumbo frames. Enabling jumbo
frames can sometimes help to improve storage throughput and reduce latency. Hewlett Packard Enterprise suggests using
jumbo frames with 10 Gb interfaces. For more information, see Maximum transmission units.
Address Resolution Protocol (ARP) The switch must support ARP, gratuitous ARP, and ARP probes as defined in RFC 5227. Lack of support for these protocols
support might cause health check failures and affect the high-availability capabilities of the array.
Ability to disable unicast storm Storage traffic can appear bursty to switches, which can be mistaken by some switches as a packet storm. Disabling unicast
control storm control ensures that the storage traffic is transmitted unfettered.
NOTE
Proxy ARP is enabled by default on many modern network devices. In rare circumstances, proxy ARP behavior on switches and routers has
been known to cause erroneous reports of duplicate IP addresses or health check failures. There are no recommendations pertaining to
proxy ARP unless the implementation of proxy ARP by the network equipment manufacturer is causing problems.
HOST CHARACTERISTICS
Each host that is connected to the HPE Nimble Storage array might have vendor-imposed requirements that might not be included in the
following lists. Be sure to review the requirements for each host operating system, along with the vendor documentation, to determine the
proper configuration for your environment.
SUBNET CONSIDERATIONS
When you determine the number of subnets that will reside on the array and the logical and physical configuration of the interfaces that will
be connected to the subnets, be sure to consider the factors listed in this section. A misconfiguration or a misunderstanding of the current
configuration, might result in reduced performance, path loss, or unexpected failovers during maintenance activities.
For more information about subnet traffic types, see the GUI Administration Guide or the CLI Administration Guide.
MANAGEMENT SUBNETS
The resiliency of the management network is important in maintaining access to HPE Nimble Storage arrays for continued administration
and management in the event of a controller failover:
• Any Ethernet interface can be designated as part of the management subnet.
• Management-type IP addresses are automatically assigned to one of the interfaces in the management subnet.
– Any interface associated with the management subnet that has a link established is eligible to receive a management-type IP address.
When the link state of the interface is detected as being down, the management-type IP address moves to another eligible interface in
the management subnet.
Technical white paper Page 10
Although HPE Nimble Storage arrays enable you to configure the management subnet to carry iSCSI data traffic as well as management
traffic, this configuration is rarely needed. Before configuring the management subnet to also carry iSCSI traffic, consider the following
cautions:
• The management subnet typically carries replication traffic, which can be high enough in volume to compete with iSCSI traffic.
• Heavy iSCSI traffic loads might interfere with management traffic or network-based monitoring protocols such as SNMP, Nimble API, or
other third-party applications that are dependent on management communication.
The following tables list factors to consider in deciding whether to dedicate a single interface or multiple interfaces to management.
TABLE 2. Pros and cons of dedicating a single interface to management
Pros of having a single management interface Cons of having a single management interface
Reduces switch port consumption Creates a single point of failure in the management subnet and increases the
likelihood of array failovers caused by disruptions on the management network
Might simplify switch configuration and deployment N/A
Allows all remaining array interfaces to be configured to support different N/A
subnets or traffic types
Customers with Fibre Channel-only arrays might want to dedicate the second
Ethernet interface on the array to replication instead of using it as a
redundant management port.
Reduces single-point-of-failure vulnerability Reduces the number of ports available for data subnets or traffic types
Increases the likelihood of receiving alarms and alerts and of preserving Causes increased switch port consumption, with some ports being relatively
management access to the array during infrastructure maintenance or unused
disruptions
Reduces the chances of failover caused by infrastructure events such as Potentially increases complexity of switch configuration and deployment
switch maintenance (reboots) or similar link failures
Technical white paper Page 11
DATA SUBNETS
The array can be configured with one or more data subnets. Any Ethernet interface can be designated as part of a data subnet. For
additional considerations about configuring the management to also function as a data subnet (that is, Mgmt + Data), see
Management subnets.
Every data subnet that is configured on the array must have one discovery IP for the subnet and one data IP for each interface that is
assigned to that data subnet. Data IP addresses are handled differently from discovery IP addresses:
• Data IP addresses are assigned to a specific physical interface. They do not move to any other interface, except in the case of controller
failover.
• Discovery IP addresses are assigned to a subnet. They are dynamically assigned by the array to use one specific interface assigned to
that subnet. Any interface in the subnet that is detected as being up is eligible to receive the discovery IP address for that subnet.
When the array detects that the interface currently hosting the discovery IP is down, the discovery IP address moves to one of the other
eligible active interfaces in that data subnet.
The following tables list the pros and cons of configuring data interfaces in different ways.
TABLE 4. Pros and cons of having a single data subnet
Pros of having a single data subnet Cons of having a single data subnet
Simplifies switch configuration and deployment Does not provide the ability to differentiate iSCSI initiators by department, role,
or business function
Increases the ability to isolate networks and potentially reduce iSCSI Potentially increases the complexity of network topology and configuration
connectivity impact from isolated switch failures
Provides the opportunity to logically differentiate iSCSI initiators by N/A
department, role, or business function
TABLE 6. Pros and cons of having a single interface per data subnet
Pros of having a single interface per data subnet Cons of having a single interface per data subnet
Reduces switch port consumption Increases chances of failover caused by infrastructure events such as switch
maintenance (reboots) or similar link failures
Simplifies switch configuration and deployment N/A
Technical white paper Page 12
TABLE 7. Pros and cons of having multiple interfaces per data subnet
Pros of having multiple interfaces per data subnet Cons of having multiple interfaces per data subnet
Might reduce per-port contention for subnets with a large number of initiators Increases switch port consumption
Does not tie discovery IP to a single interface, which can help eliminate a single point Potentially increases the complexity of switch configuration and
of failure in the iSCSI discovery process deployment
In combination with MPIO, enables the subnet to retain connectivity as long as a N/A
single participating interface remains in the up state
This reduces the chance of failover caused by infrastructure events such as switch
maintenance (reboots) or similar link failures.
SUPPORTED TOPOLOGIES
The HPE Nimble Storage array has an advanced configuration option known as IP address zones. IP address zones enable you to control the
paths that are established between the connected hosts and the array. You can use this feature to avoid sending iSCSI traffic across an ISL
between switches when you use a single subnet across multiple switches. For more information, see Considerations for subnets that traverse
multiple switches.
The associated diagrams in this section include both solid lines and dashed lines. The solid lines represent active paths (paths that are
actively serving I/O); the dashed lines represent standby paths (paths that become active during an HPE Nimble Storage controller failover).
Each of the described supported topologies must adhere to each of the requirements listed in this section. The following topologies are
supported:
• Single subnet, single switch
• Single subnet, multiple switches
• Multiple subnets, single switch
• Multiple subnets, multiple connected switches
NOTE
The terminology of individual manufacturers varies. This guide uses the terms stacked and ISL, as indicated in the glossary.
The following table lists considerations that might help in determining which topology best fits the requirements of your environment.
TABLE 8. Topology considerations
Single subnet, Single subnet, Multiple subnets, Multiple subnets,
Requirement or benefit single switch multiple switches single switch multiple switches
Direct connect
Direct connect configurations are supported only for Fibre Channel connections. Review the Validated Configuration Matrix on the
HPE InfoSight web portal to determine the requirements for a direct-connect Fibre Channel configuration.
• Bisect: Connect interfaces that are configured in the lower range of the subnet to Switch 1 and interfaces that are configured in the
higher range of subnet to Switch 2.
– Initiator IPs in the bottom half of the subnet establish sessions to target IPs in the bottom half of the subnet, when available.
• Even/odd: Connect interfaces that are configured with odd-numbered IP addresses to Switch 1 and those with even-numbered IP
addresses to Switch 2.
– Initiator IPs that end in even numbers are appropriate for target IPs that end in even numbers.
Even-numbered IPs should be connected to the same switch.
The following table shows IP address zones per subnet.
TABLE 9. IP address zones (per subnet)
Array interface (connected switch) Single (default) Bisect Even/odd
You can configure an IP address zone on each subnet, independently of the configuration that is used on other subnets. (For illustrative
purposes, a subnet mask of 255.255.255.0 is used in these examples.) For more information, see the Administration Guide (Administration
Guide → Network Configuration → Subnets → IP Address Zones in Subnets).
GLOSSARY OF TERMS
• Access control list (ACL)—A list of permissions attached to an object. An ACL specifies which users or system processes are granted
access to objects, as well as what operations are allowed on given objects.
• Access VLAN—The untagged VLAN on an access port. A switch port that is configured to associate a port with an access VLAN sends
and receives all frames within the same VLAN. 802.1Q VLAN tags are not needed because all traffic is associated with the access VLAN.
• Address Resolution Protocol (ARP)—A protocol used by the Internet Protocol (IP) RFC 826, specifically IPv4, to map IP network
addresses to the hardware addresses used by a data link protocol.
• ARP probe—An ARP request constructed with an all-zero sender IP address (defined in RFC 5227).
• Application-specific integrated circuit (ASIC)—A microchip designed for a particular application.
• Avahi protocol—The protocol for Avahi, a free zero-configuration networking (zeroconf) implementation system that enables programs
to publish and discover services and hosts running on a local network, even without DHCP or manually configured addresses.
• Backplane—The physical connection between the interface cards and the data and power distribution buses in a network device such as
a router, hub, or switch.
• Broadcast domain—A logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer.
A broadcast domain can be within the same LAN segment, or it can be bridged to other LAN segments.
• DHCP snooping—A Layer 2 security technology built into the operating system of a capable network switch. It can drop DHCP traffic
that is determined to be unacceptable. The fundamental use case for DHCP snooping is to prevent unauthorized (rogue) DHCP servers
from offering IP addresses to DHCP clients.
• Discovery IP address—An iSCSI target IP address used so that the iSCSI initiators can determine which storage LUN or volume on the
network is available for access.
• Disjointed subnet—A subnet in which all devices are expected to be able to communicate with each other, but for which a boundary is in
place that prevents communication between some devices.
• Duplex—A label describing the transmission of data. Full duplex refers to the transmission of data in two directions simultaneously. For
example, a telephone is a full-duplex device because both parties can talk at once. In contrast, a walkie-talkie is a half-duplex device
because only one party can transmit at a time.
Technical white paper Page 19
• Ethernet VPN (EVPN)—A VPN between Ethernet devices (for example, MAC addresses) as opposed to a VPN between IP addresses.
EVPN enables controlled communication between Ethernet end points, regardless of IP addresses, and can be used over WAN circuits or
between individual ports in an Ethernet switch. When used in conjunction with VXLAN in an Ethernet network, EVPN is one method of
creating a software-defined network.
• Frame check sequence (FCS) headers—The extra bits and characters added to data packets for error detection and control. Each frame
is comprised of bits of data appended to the header, which holds basic information such as source and destination MAC addresses and
application and contains the cyclic redundancy check (CRC).
• Flow control—A mechanism for temporarily pausing the transmission of data on Ethernet networks when a sending node transmits data
faster than the receiving node can accept it.
• Field-Programmable Gate Array (FPGA)—An integrated circuit (IC) that can be programmed in the field after manufacture.
Manufacturers use FPGAs in the design of specialized ICs that can later be produced hard-wired in large quantities for distribution to
computer manufacturers and end users.
• Gratuitous ARP—An ARP response that was not prompted by an ARP request. A gratuitous ARP is sent as a broadcast frame, as a way
for a node to announce or update its IP-to-MAC mapping to the entire network.
• Ifaces (Linux)—Linux interfaces that are used for iSCSI port binding. Creating ifaces in Linux for iSCSI interfaces enables full-mesh
connectivity from the host to the array when a single subnet is used across multiple interfaces.
• Initiator—Software or hardware that enables a host computer to send data to an external iSCSI-based storage array through an Ethernet
network.
• Interface—The point of interconnection between a computer and a private or public network. A network interface is generally a network
interface card (NIC), but it does not have to have a physical form.
• IP address zones (or network affinity zones—NAZs)—A feature that makes it possible to configure the storage system to avoid
balancing connections over an ISL when an iSCSI subnet has two or more interfaces that are connected to different switches.
• Internet Small Computer System Interface (iSCSI)—An IP-based storage-networking standard that enables SCSI commands to be sent
end-to-end over LANs, WANs, or the internet.
• Inter-switch link (ISL)—A connection that joins two switches and maintains VLAN information as traffic flows between switches and
routers. The term ISL may refer to the proprietary Cisco Inter-Switch Link standard or to the general concept of connecting nonstacked
switches through one or more Ethernet cables.
• Jumbo frames—An Ethernet frame with a payload greater than the standard MTU of 1,500 bytes. Jumbo frames can be as large as
9000 bytes.
• Local area network (LAN)—A computer network that spans a relatively small area.
• Latency—Any of several kinds of delays typically incurred in the processing of network data. A low-latency network connection is one
that experiences short delay times, whereas a high-latency connection is affected by long delays.
• Link aggregation—A way of bundling many individual Ethernet links together so that they act like a single logical link.
• Link aggregation group (LAG)—A collection of Ethernet links that participate in link aggregation with each other.
• Lossy network—A network that is likely to experience packet loss.
• Least queue depth (LQD)—An MPIO load-balancing policy that can help determine which path will be used for the next I/O operation,
based on which path is least utilized at that moment.
• Media access control (MAC) address—A unique identifier of a device. The MAC address is assigned to a network interface controller
(NIC) for communications at the data link layer of a network segment. MAC addresses are used as a network address for most IEEE 802
network technologies, including Ethernet, Wi-Fi, and Bluetooth®.
• Multipath I/O (MPIO)—A framework designed to mitigate the effects of adapter failure by providing an alternative data path between
storage devices and hosts.
• Maximum transmission unit (MTU)—The largest size frame, specified in octets (eight-bit bytes), that can be sent in any Ethernet-based
network. Network devices use the configured MTU setting to determine the maximum size of each frame in any transmission.
• Native VLAN—The VLAN ID to which untagged packets are assigned.
• Nonblocking switch—A switch that has a backplane that provides enough bandwidth to support full-duplex connectivity for all ports at
the same time.
Technical white paper Page 20
• Packet loss—The failure of one or more transmitted packets to arrive at their destination.
• Packet storm—The severe congestion that occurs when a network system is overwhelmed by continuous multicast or broadcast traffic.
• Proxy ARP—The technique by which one host, usually a router or switch, answers ARP requests that were intended for another machine.
• Quality of service (QoS)—Any technology that manages data traffic to reduce packet loss, latency, and jitter on the network. QoS
controls and manages network resources by setting priorities for specific types of data on the network.
• Round robin (RR)—An MPIO load-balancing policy that helps determine which path will be used for the next I/O operation. RR assigns
the I/O to the next path, regardless of its level of use.
• Spanning Tree Protocol (STP)—A network protocol that builds a loop-free logical topology for Ethernet networks to prevent packet
storms.
• Stack/stacked switches/multiswitch stack—A set of switches or switch modules that are connected through dedicated stacking ports
or ports that are defined in the software to be stacking ports. Stacked switches typically behave as if they were one physical switch.
• Storm control/unicast storm control—A safety measure on switches that can block or discard traffic when it occurs at a rate higher than
a configured threshold.
• Subnet—A logical partition of an IP network into multiple smaller network segments. It is typically used to subdivide large networks into
smaller, more efficient subnetworks. Each subnet allows its connected devices to communicate with each other, and routers are used to
communicate between subnets.
• Target—An iSCSI storage device that is capable of providing shared block storage to clients across a TCP/IP network.
• Transmission Control Protocol (TCP) congestion control—A TCP algorithm that seeks to control throughput to minimize packet loss in
a TCP conversation.
• TCP global synchronization—The situation in which one host can introduce traffic patterns that cause the other hosts to behave
similarly. TCP global synchronization is usually associated with switch congestion, packet loss, loss recovery, and TCP congestion control.
• Throughput—The amount of data that is moved successfully from one place to another in a network within a given time period.
Throughput is typically measured in bits per second (bps), as in megabits per second (Mbps) or gigabits per second (Gbps).
• Unicast—Communication between a single sender and a single receiver over a network.
• Virtual Extensible LAN (VXLAN)—An evolution of traditional VLANs. VXLANs can support more VLAN IDs (16 million versus 4096).
They also enable the creation of VLANs that can be as small as a single switch port. When combined with eVPN to allow Layer 3 routing
between VXLANs, technologies such as software-defined networking (SDN) can dynamically redesign broadcast domains without
fundamentally changing the switch port configuration. In this technique, Layer 3 (IP-routed) traffic is passed between VXLANS over eVPN
instances, and the eVPN instances can be dynamically managed based on rules that are defined in the network infrastructure.
• Virtual local area network (VLAN)—A custom network that is used to segment broadcast domains.
• VLAN tagging—A method used by networked devices to identify which VLAN each individual packet should be associated with.
• Wide area network (WAN)—A geographically distributed private telecommunications network that interconnects multiple LANs. In an
enterprise, a WAN might consist of connections to a company’s headquarters, branch offices, colocation facilities, cloud services, and other
facilities.
• Wirespeed—The hypothetical peak physical layer net bitrate (useful information rate) of a cable (consisting of fiber-optical wires or
copper wires) combined with a particular digital communication device, interface, or port.
• Zero-configuration networking (zeroconf)—A set of technologies that automatically creates a usable computer network, based on the Internet
Protocol Suite (TCP/IP), in the absence of DHCP or manual configuration.
Technical white paper
LEARN MORE AT
hpe.com/storage
Get updates
© Copyright 2019, 2021 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change
without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty
statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Windows is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. Linux
is the registered trademark of Linus Torvalds in the U.S. and other countries. VMware and VMware vSphere are registered
trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions. Bluetooth is a trademark owned by its
proprietor and used by Hewlett Packard Enterprise under license. All third-party marks are property of their respective owners.