HP XP24000 manual Protecting Volumes from Copy Operations

Page 57

5.Use the Select Security Group drop-down list to select a security group in which you want to register an LDEV group.

6.Use the LDEV Group drop-down list to select an LDEV group that you want to register in the security group, and then click OK.

7.Click Apply in the Volume Security window (Figure 4).

A message appears and asks if you want to apply the settings to the storage system.

8.Click Yes.

The settings are applied to the storage system.

CAUTION:

If the Error Detail dialog box (section The Error Detail Dialog Box” on page 41) appears, see the Caution in section Port-Level Security Implementation” on page 10 and then remove errors.

Protecting Volumes from Copy Operations

The following procedure makes volumes in a security group unusable as secondary volumes (that is, copy destination volumes) for copy operations, so you will be able to protect data the volumes from being overwritten by copy operations.

To make volumes in a security group unusable as secondary volumes:

1.Ensure that you are in Modify mode.

2.In the Volume Security window (Figure 4), double-click an LDKC number.

3.Right-click Security Group or the desired security group. A pop-up menu appears.

4.Select Add/Change from the pop-up menu.

The Add/Change Security Group dialog box (Figure 8) appears.

5.Ensure that the desired security group is selected in the Security Group List table.

6.Select Disable in the T-VOL/R-VOL box.

7.Click Change.

The change is reflected in the dialog box.

8.Click OK.

CAUTION:

Here, the settings in the window have not been applied to the storage system.

9.Click Apply in the Volume Security window (Figure 4).

A message appears and asks if you want to apply the settings to the storage system.

10.Click Yes.

The settings are applied to the storage system.

XP24000/XP20000 Volume Security User's Guide

57

Image 57
Contents HP StorageWorks XP24000/XP20000 Volume Security Users Guide Edition Date Description Contents Troubleshooting Support and Other ResourcesAcronyms and Abbreviations Index Figures Tables Overview of Volume Security OverviewTerminology Overview of Volume Security Overview of Volume Security Functions About Volume Security OperationsProtecting Volumes from I/O Operations at Mainframe Hosts Enabling Only the Specified Hosts to Access VolumesPort-Level Security Implementation Port-Level SecurityProhibiting All Hosts from Accessing Volumes Protecting Volumes from Erroneous Copy Operations Registering Volumes in an Ldev Group on Supported Volume Emulation TypesMaximum Possible Number of Groups Maximum Possible Number of Hosts and VolumesVolume Security Window Using the Volume Security GUISecurity Group Tree Volume Security WindowSecurity Group Tree Hosts Table Column Description LDEVs TableCreating a Security Group for Use As a Pool Group on Add/Change Security Group Dialog BoxAdd/Change Security Group Dialog Box VOL/R Add/Change Host Group Dialog Box Add/Change Host Group Dialog Box Item Description Add/Change Ldev Group Dialog BoxAdd/Change Ldev Group Dialog Box Registering Hosts to be Attached to the Storage System on Add/Change Host Dialog BoxNo icon Select Ldev Dialog Box Select Ldev Dialog BoxSelect Port Dialog Box Select Port Dialog Box Specify Security Group Dialog Box Specify Security Group Dialog BoxHost to Security Group Dialog Box Host to Security Group Dialog BoxHost to Ldev Dialog Box Host Third The Logical Partition Number of the host Host Group to Security Group Dialog BoxHost Group Specifies a host group Host Group to Port Dialog BoxHost Group to Port Dialog Box Ldev to Security Group Dialog BoxLdev to Security Group Dialog Box Ldev to Host Dialog BoxLdev to Host Dialog Box Information about the channel extender Ldev Group to Security Group Dialog BoxLdev Group to Security Group Dialog Box Error Detail Dialog BoxError Detail Dialog Box Performing Volume Security Operations Launching Volume SecurityViewing Security Settings Locating Security Groups that Contain a Specified Host Locating Volumes in a Specified Security GroupLocating Security Groups that Contain a Specified Volume Locating Ports through Which Hosts Can Access VolumesLocating Security Groups that Contain a Specified Host Group Creating a Host Group Limiting Host AccessRegistering Hosts in a Host Group Registering Ports in a Host Group Creating an Ldev Group Registering Volumes in an Ldev Group Creating a Security Group for Use As an Access Group Prohibiting Host Access Registering Volumes in an Ldev Group Creating a Security Group for Use As a Pool Group Registering an Ldev Group in a Security Group Protecting Volumes from Copy Operations TIP Disabling Volume SecurityEditing Security Groups Unregistering a Host GroupUnregistering an Ldev Group Renaming Security Groups Editing Host Groups Deleting Security GroupsRegistering Hosts to be Attached to the Storage System =CPU Deleting Hosts from Host GroupsDeleting Ports from Host Groups Renaming Host Groups Deleting Volumes from Ldev Groups Editing Ldev GroupsDeleting Host Groups Renaming Ldev Groups Deleting Ldev Groups Performing Volume Security Operations Troubleshooting Troubleshooting Volume SecurityCalling HP Technical Support Troubleshooting Related Documentation Support and Other ResourcesConventions for Storage Capacity Values HP Technical SupportSubscription Service HP WebsitesDocumentation Feedback Acronyms and Abbreviations Acronyms and AbbreviationsAcronyms and Abbreviations Index Pool group, 11 port-level security overview
Related manuals
Manual 42 pages 11.22 Kb Manual 170 pages 46.46 Kb