WAN Subsystem Configuration and Management Manual
Adding a SWAN Concentrator
WAN Subsystem Configuration and Management Manual—522463-011
4-31
Configuration Requirements and Recommendations
Configuration Requirements and 
Recommendations
•
The WAN manager process is preconfigured by HP manufacturing and is running 
in processor 0 with the backup process running in processor 1.
•
HP recommends that you configure the SWAN concentrator across two E4SAs, 
FESAs, GESAs, G4SAs or VIO enclosures for improved fault tolerance. (VIO 
enclosures are supported in H06.08 and subsequent H-series RVUs.)
•
The SWAN concentrator must be configured to use the same TCP/IP processes as 
do the E4SA, FESA, GESA, or G4SA ports to which the SWAN concentrator is 
connected.
•
The preferred and alternate TCP/IP processes that one SWAN concentrator is 
configured to must be configured with separate TCP/IP SUBNET objects.
•
The SWAN concentrator IP addresses associated with Ethernet path A must be on 
the same SUBNET as the preferred TCP/IP process. The SWAN concentrator IP 
addresses associated with Ethernet path B must be on the same subnet as the 
alternate TCP/IP process. 
•
The SWAN concentrator IP addresses associated with Ethernet path A must be on 
a different SUBNET than the SWAN concentrator IP addresses associated with 
Ethernet path B. (This should always be the case because the preferred and 
alternate NonStop TCP/IP processes are configured on different SUBNETs.)
•
One ConMgr process is required in each processor that supports a DEVICE object.
•
The WAN manager process automatically configures WANBoot, TFTP, and the 
SNMP trap multiplexer processes. HP does not recommend configuring these 
processes separately.
•
Each data communications subsystem object has requirements imposed on its 
configuration as a DEVICE object by the data communications subsystem to which 
it belongs. You will need to read the manuals listed in Table 2-2 on page 2-2 for 
product-specific requirements.
Note. The path A and path B IP addresses must be different. Violation of this rule does 
not always prevent successful operation, but many functions will not work properly, 
including path switching under failure conditions, latent failure detection, and OSM and 
TSM operations such as incident analysis and SWAN CLIP firmware update.










