HP XP24000 manual Supported Volume Emulation Types, Registering Volumes in an Ldev Group on

Page 13

When applying security, make sure that your security settings are correct. If incorrect security settings are made, the system will be difficult or impossible to control.

If the CPU of a mainframe host is upgraded after you apply security settings, you must execute the system command D M=CPU at the mainframe host to obtain the latest information about the host. Next, you must use the latest information to update host information in the Add/Change Host dialog box (for details, see The Add/Change Host Dialog Box” on page 27).

If you do not update host information, the system will be impossible to control.

If you are using storage system copy software (TrueCopy for Mainframe, Universal Replicator for Mainframe, ShadowImage for Mainframe, and XP for FlashCopy Mirroring or XP for FlashCopy Mirroring V2): When you use Volume Security to make security settings, you must register the primary volume and the secondary volume (that is, the copy source volume and the copy destination volume) in the same LDEV group. For details on how to register volumes in LDEV groups, see Registering Volumes in an LDEV Group” on page 51 or

Registering Volumes in an LDEV Group” on page 54.

If you apply security to a primary volume (that is, copy source volume) of a pair of storage system copy software, some or all mainframe hosts might become unable to read from and write to the primary volume. However, the copy operation will be performed normally; data will be copied from the primary volume to the secondary volume.

If you register a primary volume or secondary volume in a security group and then make a setting for preventing the volume from being used as a secondary volume, this setting will take effect after the pair is split.

Mainframe hosts cannot access volumes in pool groups. If a volume in a pool group is specified as a primary volume, the pair creation command might fail.

In the Hitachi TrueCopy™ for Mainframe User's Guide, primary volumes (that is, copy source volumes) are often referred to as M-VOLsor main volumes. Also, secondary volumes (that is, copy destination volumes) are often referred to as R-VOLsor remote volumes.

In the Hitachi ShadowImage™ for Mainframe User's Guide, primary volumes (that is, copy source volumes) are often referred to as S-VOLs or source volumes. Also, secondary volumes (that is, copy destination volumes) are often referred to as T-VOLs or target volumes.

If you are using Virtual LVI/LUN (VLL) volumes:If you apply security to a VLL volume, you will be unable to change the VLL settings on the volume. To change the VLL settings, you must use Volume Security to disable security on the VLL volume. For details on how to disable security, see Disabling Volume Security” on page 58.

If you are using HP StorageWorks XP for Compatible Parallel Access Volumes Software: If you apply security to a Parallel Access Volumes base volume, the security settings will also apply to the corresponding alias volume.

Removing secured volumes:If you apply security to a volume, you will be unable to remove the volume. To remove the volume, you must disable security on the volume. For details on how to disable security, see Disabling Volume Security” on page 58.

Removing PCBs with secured ports: If port-level security is applied to your storage system, you cannot remove the PCBs (printed circuit boards) that include secured ports. To remove PCBs that include secured ports, you must use Volume Security Port Option to disable security on the ports. For details on how to disable security, see Deleting Ports from Host Groups” on page 63.

Supported Volume Emulation Types

Volume emulation types (that is, device emulation types): Volume Security supports the following volume emulation types:

3380-3, 3380-3A, 3380-3B, 3380-3C

3390-3, 3390-3A, 3390-3B, 3390-3C, 3390-3R

XP24000/XP20000 Volume Security User's Guide

13

Image 13
Contents HP StorageWorks XP24000/XP20000 Volume Security Users Guide Edition Date Description Contents Support and Other Resources TroubleshootingAcronyms and Abbreviations Index Figures Tables Overview Overview of Volume SecurityTerminology Overview of Volume Security Overview of Volume Security Functions About Volume Security OperationsProtecting Volumes from I/O Operations at Mainframe Hosts Enabling Only the Specified Hosts to Access Volumes Port-Level Security Implementation Port-Level SecurityProhibiting All Hosts from Accessing Volumes Protecting Volumes from Erroneous Copy Operations Registering Volumes in an Ldev Group on Supported Volume Emulation TypesMaximum Possible Number of Groups Maximum Possible Number of Hosts and VolumesVolume Security Window Using the Volume Security GUISecurity Group Tree Volume Security WindowSecurity Group Tree Hosts Table Column Description LDEVs TableCreating a Security Group for Use As a Pool Group on Add/Change Security Group Dialog BoxAdd/Change Security Group Dialog Box VOL/R Add/Change Host Group Dialog Box Add/Change Host Group Dialog Box Item Description Add/Change Ldev Group Dialog BoxAdd/Change Ldev Group Dialog Box Registering Hosts to be Attached to the Storage System on Add/Change Host Dialog BoxNo icon Select Ldev Dialog Box Select Ldev Dialog BoxSelect Port Dialog Box Select Port Dialog Box Specify Security Group Dialog Box Specify Security Group Dialog BoxHost to Security Group Dialog Box Host to Security Group Dialog BoxHost to Ldev Dialog Box Host Third The Logical Partition Number of the host Host Group to Security Group Dialog BoxHost Group Specifies a host group Host Group to Port Dialog BoxHost Group to Port Dialog Box Ldev to Security Group Dialog BoxLdev to Security Group Dialog Box Ldev to Host Dialog BoxLdev to Host Dialog Box Information about the channel extender Ldev Group to Security Group Dialog BoxLdev Group to Security Group Dialog Box Error Detail Dialog BoxError Detail Dialog Box Launching Volume Security Performing Volume Security OperationsViewing Security Settings Locating Security Groups that Contain a Specified Host Locating Volumes in a Specified Security GroupLocating Security Groups that Contain a Specified Volume Locating Ports through Which Hosts Can Access VolumesLocating Security Groups that Contain a Specified Host Group Creating a Host Group Limiting Host AccessRegistering Hosts in a Host Group Registering Ports in a Host Group Creating an Ldev Group Registering Volumes in an Ldev Group Creating a Security Group for Use As an Access Group Prohibiting Host Access Registering Volumes in an Ldev Group Creating a Security Group for Use As a Pool Group Registering an Ldev Group in a Security Group Protecting Volumes from Copy Operations TIP Disabling Volume SecurityUnregistering a Host Group Editing Security GroupsUnregistering an Ldev Group Renaming Security Groups Deleting Security Groups Editing Host GroupsRegistering Hosts to be Attached to the Storage System =CPU Deleting Hosts from Host GroupsDeleting Ports from Host Groups Renaming Host Groups Editing Ldev Groups Deleting Volumes from Ldev GroupsDeleting Host Groups Renaming Ldev Groups Deleting Ldev Groups Performing Volume Security Operations Troubleshooting Volume Security TroubleshootingCalling HP Technical Support Troubleshooting Related Documentation Support and Other ResourcesConventions for Storage Capacity Values HP Technical SupportHP Websites Subscription ServiceDocumentation Feedback Acronyms and Abbreviations Acronyms and AbbreviationsAcronyms and Abbreviations Index Pool group, 11 port-level security overview
Related manuals
Manual 42 pages 11.22 Kb Manual 170 pages 46.46 Kb