When you install Stealth in your environment, it includes several new management components that are used to configure your Stealth environment. You use these management components to create your COIs, and you can create as many COIs as are needed to separate and protect the network traffic in the environment.
As required, you can configure an environment that allows you to enable simultaneous Stealth-secured communications for as many Stealth-enabled physical servers, virtual machines, and ClearPath Forward partitions as you want to configure in the environment.