beautypg.com

Protecting volumes from erroneous copy operations – HP XP P9500 Storage User Manual

Page 143

background image

volumes (vol_A and vol_B) in a pool group, all the mainframe hosts connected to your storage
system will be unable to access vol_A and vol_B. To register volumes in a pool group, you must
create an LDEV group, register the volumes in the LDEV group, and then register the LDEV group
in the desired pool group. A pool group may contain only one LDEV group.

In the next figure, volumes ldev7, ldev8, and ldev9 in the pool group are inaccessible from all
hosts:

Protecting Volumes from Erroneous Copy Operations

When P9500 copy software (Continuous Access Synchronous Z (Cnt Ac-S Z), Continuous Access
Journal Z (Cnt Ac-J Z), Business Copy for Mainframe (BC Z), Compatible FlashCopy, or FICON(R)
Data Migration is used to perform copy operations, data is overwritten on the secondary volumes
, the copy destination volumes. If a volume that contains important data is specified as a secondary
volume by mistake, P9500 copy software operations could overwrite important data on the volume,
causing data loss.

With Volume Security for Mainframe you can prevent a volume from being used as a secondary
volume to avoid data loss.

Secondary volumes, referred to as Continuous Access Synchronous remote volumes or R-VOLs
Business Copy target volumes or T-VOLs See P9000 Continuous Access Synchronous for Mainframe
Systems User Guide and P9000 Business Copy for Mainframe Systems User Guide.

Protecting Volumes from I/O Operations at Mainframe Hosts

143