•
•
•
Figure 5 Security Group Tree
Icon Description
Indicates an access group whose volumes can be used as secondary volumes (i.e., copy destination volumes) for copy operations.
Indicates an access group whose volumes cannot be used as secondary volumes (i.e., copy destination volumes) for copy operations.
Indicates a pool group whose volumes can be used as secondary volumes (i.e., copy des- tination volumes) for copy operations.
Indicates a pool group whose volumes cannot be used as secondary volumes (i.e., copy destination volumes) for copy operations.
XP24000/XP20000 Volume Security User's Guide | 17 |