HP XP24000 manual Protecting Volumes from Erroneous Copy Operations

Page 12

volumes (vol_A and vol_B) in a pool group, all the mainframe hosts connected to your storage system will be unable to access vol_A and vol_B. To register volumes in a pool group, you must create an LDEV group, register the volumes in the LDEV group, and then register the LDEV group in the desired pool group. Any pool group can only contain one LDEV group.

In Figure 3, a pool group is created. Volumes in this pool group (that is, ldev7, ldev8, and ldev9) are inaccessible from all the hosts:

Figure 3 Security Example 3

Protecting Volumes from Erroneous Copy Operations

When storage system copy software (TrueCopy for Mainframe, Universal Replicator for Mainframe, ShadowImage for Mainframe, and HP StorageWorks XP for FlashCopy Mirroring Software or XP for FlashCopy Mirroring V2 Software) is used to perform copy operations, data will be overwritten onto the secondary volumes (that is, the copy destination volumes). If a volume containing important data is specified as a secondary volume (that is, the copy destination volume) by mistake, storage system copy software operations can overwrite important data on the volume and you could suffer loss of important data.

Volume Security enables you to avoid such loss of data. If a volume contains data that should not be overwritten, you can prevent the volume from being used as a secondary volume (that is, the copy destination volume).

Secondary volumes (that is, copy destination volumes) are often referred to as remote volumes or R-VOLsin the Hitachi TrueCopy™ for Mainframe User's Guide. Also, secondary volumes are referred to as target volumes or T-VOLsin the Hitachi ShadowImage™ for Mainframe User's Guide.

Warnings Regarding Volume Security

Do not apply security to volumes on which any job is running. If you apply security to such a volume, the job will possibly end abnormally.

12 About Volume Security Operations

Image 12
Contents HP StorageWorks XP24000/XP20000 Volume Security Users Guide Edition Date Description Contents Troubleshooting Support and Other ResourcesAcronyms and Abbreviations Index Figures Tables Overview of Volume Security OverviewTerminology Overview of Volume Security About Volume Security Operations Overview of Volume Security FunctionsProtecting Volumes from I/O Operations at Mainframe Hosts Enabling Only the Specified Hosts to Access VolumesPort-Level Security Port-Level Security ImplementationProhibiting All Hosts from Accessing Volumes Protecting Volumes from Erroneous Copy Operations Supported Volume Emulation Types Registering Volumes in an Ldev Group onMaximum Possible Number of Hosts and Volumes Maximum Possible Number of GroupsUsing the Volume Security GUI Volume Security WindowVolume Security Window Security Group TreeSecurity Group Tree Hosts Table LDEVs Table Column DescriptionAdd/Change Security Group Dialog Box Creating a Security Group for Use As a Pool Group onAdd/Change Security Group Dialog Box VOL/R Add/Change Host Group Dialog Box Add/Change Host Group Dialog Box Add/Change Ldev Group Dialog Box Item DescriptionAdd/Change Ldev Group Dialog Box Add/Change Host Dialog Box Registering Hosts to be Attached to the Storage System onNo icon Select Ldev Dialog Box Select Ldev Dialog BoxSelect Port Dialog Box Select Port Dialog Box Specify Security Group Dialog Box Specify Security Group Dialog BoxHost to Security Group Dialog Box Host to Security Group Dialog BoxHost to Ldev Dialog Box Host Group to Security Group Dialog Box Host Third The Logical Partition Number of the hostHost Group to Port Dialog Box Host Group Specifies a host groupLdev to Security Group Dialog Box Host Group to Port Dialog BoxLdev to Host Dialog Box Ldev to Security Group Dialog BoxLdev to Host Dialog Box Ldev Group to Security Group Dialog Box Information about the channel extenderError Detail Dialog Box Ldev Group to Security Group Dialog BoxError Detail Dialog Box Performing Volume Security Operations Launching Volume SecurityViewing Security Settings Locating Volumes in a Specified Security Group Locating Security Groups that Contain a Specified HostLocating Ports through Which Hosts Can Access Volumes Locating Security Groups that Contain a Specified VolumeLocating Security Groups that Contain a Specified Host Group Limiting Host Access Creating a Host GroupRegistering Hosts in a Host Group Registering Ports in a Host Group Creating an Ldev Group Registering Volumes in an Ldev Group Creating a Security Group for Use As an Access Group Prohibiting Host Access Registering Volumes in an Ldev Group Creating a Security Group for Use As a Pool Group Registering an Ldev Group in a Security Group Protecting Volumes from Copy Operations Disabling Volume Security TIPEditing Security Groups Unregistering a Host GroupUnregistering an Ldev Group Renaming Security Groups Editing Host Groups Deleting Security GroupsRegistering Hosts to be Attached to the Storage System Deleting Hosts from Host Groups =CPUDeleting Ports from Host Groups Renaming Host Groups Deleting Volumes from Ldev Groups Editing Ldev GroupsDeleting Host Groups Renaming Ldev Groups Deleting Ldev Groups Performing Volume Security Operations Troubleshooting Troubleshooting Volume SecurityCalling HP Technical Support Troubleshooting Support and Other Resources Related DocumentationConventions for Storage Capacity Values HP Technical SupportSubscription Service HP WebsitesDocumentation Feedback Acronyms and Abbreviations Acronyms and AbbreviationsAcronyms and Abbreviations Index Pool group, 11 port-level security overview
Related manuals
Manual 42 pages 11.22 Kb Manual 170 pages 46.46 Kb