Contents
1 Overview of Volume Security | 7 |
Overview | 7 |
Terminology | 7 |
2 About Volume Security Operations | 9 |
Overview of Volume Security Functions | 9 |
Protecting Volumes from I/O Operations at Mainframe Hosts | 9 |
Enabling Only the Specified Hosts to Access Volumes | 9 |
10 | |
10 | |
Prohibiting All Hosts from Accessing Volumes | 11 |
Protecting Volumes from Erroneous Copy Operations | 12 |
Warnings Regarding Volume Security | 12 |
Supported Volume Emulation Types | 13 |
Maximum Possible Number of Groups | 14 |
Maximum Possible Number of Hosts and Volumes | 14 |
3 Using the Volume Security GUI | 15 |
The Volume Security Window | 15 |
Security Group Tree | 16 |
Hosts Table | 18 |
LDEVs Table | 19 |
The Add/Change Security Group Dialog Box | 20 |
The Add/Change Host Group Dialog Box | 23 |
The Add/Change LDEV Group Dialog Box | 25 |
The Add/Change Host Dialog Box | 27 |
The Select LDEV Dialog Box | 29 |
The Select Port Dialog Box | 30 |
The Specify Security Group Dialog Box | 32 |
The Host to Security Group Dialog Box | 33 |
The Host to LDEV Dialog Box | 34 |
Host Group to Security Group Dialog Box | 35 |
The Host Group to Port Dialog Box | 36 |
The LDEV to Security Group Dialog Box | 37 |
The LDEV to Host Dialog Box | 38 |
The LDEV Group to Security Group Dialog Box | 40 |
The Error Detail Dialog Box | 41 |
4 Performing Volume Security Operations | 43 |
Launching Volume Security | 43 |
Viewing Security Settings | 43 |
Locating Volumes in a Specified Security Group | 44 |
Locating Security Groups that Contain a Specified Host | 44 |
Locating Volumes in a Security Group that Contains a Specified Host | 44 |
XP24000/XP20000 Volume Security User's Guide | 3 |