7 data protection operations with raid manager – HP XP P9500 Storage User Manual
Page 6

Business Copy duplicated mirroring....................................................................................135
Business Copy cascading pairs..........................................................................................136
Restrictions for Business Copy cascading volumes............................................................137
Restriction for Continuous Access Synchronous/Business Copy cascading volumes...............138
Continuous Access Synchronous takeover commands............................................................138
Continuous Access Synchronous remote commands..............................................................139
Continuous Access Synchronous local commands.................................................................140
Continuous Access Synchronous, Business Copy, and Continuous Access Journal operations...........141
Continuous Access Synchronous/Business Copy volumes.......................................................141
Continuous Access Synchronous/Business Copy/Continuous Access Journal pair status.............142
Continuous Access Asynchronous, Continuous Access Synchronous, and Continuous Access Journal
volumes..........................................................................................................................146
Sidefile cache for Continuous Access Asynchronous.........................................................148
Continuous Access Asynchronous transition states and sidefile control................................149
Continuous Access Asynchronous/Continuous Access Journal error state.............................150
Snapshot volumes............................................................................................................153
Creating a Snapshot pair..................................................................................................153
Snapshot pair status.........................................................................................................154
Pair status relationship to Snapshot commands.....................................................................155
Specifications for Auto LUN...............................................................................................155
Commands to control Auto LUN.........................................................................................157
Relations between "cc" command issues and status..............................................................159
Restrictions for Auto LUN...................................................................................................161
Overview........................................................................................................................161
Policy ............................................................................................................................162
horcm.conf......................................................................................................................162
Command specifications...................................................................................................163
pairdisplay command..................................................................................................163
pairsplit command......................................................................................................164
Notice on system operation...............................................................................................166
Configuration examples....................................................................................................167
7 Data protection operations with RAID Manager..........................................172
Protection parameters and operations......................................................................................174
Data Protection facility...........................................................................................................175
Data Protection Facility specifications..................................................................................176
Examples for configuration and protected volumes...............................................................177
The operation authority with CMD security enabled..............................................................178
Target commands for protection.........................................................................................178
permission command.......................................................................................................178
6
Contents