Item
Enter Secur- ity Group
Security
Group
Status
T-VOL/R-
VOL
Add
Description
When creating a new security group, you enter the name of the security group in this Enter Security Group text box. When renaming an existing security group, you select the security group in the Security Group List table and then enter a new name.
The following conventions apply to security group names:
•Up to eight characters can be used.
•Characters are
•The following characters cannot be used: \ , / : ; * ? " < >
•The first character and the last character must not be a space.
Select to make no changes, enable, or disable security settings. The default is Enable.
•No Change does not change the security status of the security groups selected in the Security Group List table. For example, if you select a
•Enable enables the security settings that are made in the security groups selected in the Se- curity Group List table.
CAUTION:
It is possible that security settings are disabled even if Enable is selected. If Access is selected in the Group Status box (see below) and the security group contains neither a host group nor an LDEV group, security settings in the security group are disabled unconditionally.
•Disable disables the security settings that are made in the security groups selected in the Se- curity Group List table.
Sets a selected security group as access groups or pool groups. The default is Access.
•No Change does not change the group status of the security groups selected in the Security Group List table. For example, if you select one access group and one pool group, Access changes the two groups into access groups, but No Change does not change the two groups (The former remains an access group and the latter remains a pool group).
•Access specifies the selected security groups as access groups. Volumes in an access group can only be accessed by hosts registered in the same access group but cannot be accessed by other hosts.
•Pool specifies the selected security groups as pool groups. Volumes in a pool group cannot be accessed by any hosts.
Specifies whether volumes in the security group can be used a secondary volumes (i.e., copy destination volumes). The default is Enable.
•No Change does not change the secondary volume settings of the security groups selected in the Security Group List table. For example, if volumes in one of the selected security groups are usable as copy destinations, but volumes in the other security group are unusable, Enable makes volumes in both groups usable as destinations. However, No Change does not change volumes in both groups (The former remains usable, and the latter remains unusable).
•Enable makes volumes in the selected security groups usable as secondary volumes (copy destinations).
•Disable makes volumes in the selected security groups unusable as secondary volumes (copy destinations).
Enter the name of a new security group and click Add. Then the new security group is added to the Security Group List table.
22 Using the Volume Security GUI