Chapter 5 Operation Procedures
III-10
5
5
5.
.
.4
4
4
A
A
Ac
c
cc
c
ce
e
es
s
ss
s
s
C
C
Co
o
on
n
nt
t
tr
r
ro
o
ol
l
l
I
I
In
n
ns
s
st
t
ta
a
al
l
ll
l
la
a
at
t
ti
i
io
o
on
n
n
When initially installing Access Control, make the settings basically in accordance with the following procedure.
Set a disk array. (For de tails, refer to 5.4.2 "Setting a Disk Array".)
Set the port access mode. (For details, refer to 5.4.3 "Setting the Port
Access Mode".)
Create an LD Set. (For details, re fer to 5.4.4 "Creating an LD Set".)
Set links to the paths of LD Sets. (For details, refer to 5.4.5 "Linking
an LD Set and Path".)
Assign a logical disk. (For details, refer to 5.4.6 "Assigning a Logical
Disk".)
Start the Access Control. (For details, refer to 5.4.7 "Starting the
Access Control".
Stop the Server
Set a Disk Array
Set the Port Access Mode
Create an LD Set
Start the Server
Link LD Set and Path
Assign a Logical Disk
Start the Access Control