5 configuring access attributes, 6 protecting volumes from i/o operations – HP XP P9500 Storage User Manual
Page 7

Access attributes strategies.....................................................................................................135
Volume Retention requirements...............................................................................................135
Access attribute restrictions.....................................................................................................135
Keywords............................................................................................................................136
Assigning access attribute......................................................................................................136
6 Protecting volumes from I/O operations.....................................................139
Overview of Volume Security for Mainframe.............................................................................139
Volume Security for Mainframe Requirements...........................................................................139
Volume Security for Mainframe Functions.................................................................................139
Protecting Volumes from I/O Operations at Mainframe Hosts.....................................................140
Warnings Regarding Volume Security for Mainframe.................................................................144
Supported Volume Emulation Types.........................................................................................145
Maximum Number of Groups.................................................................................................145
Maximum Number of Hosts and Volumes................................................................................145
Launching Volume Security for Mainframe................................................................................145
Viewing Security Settings.......................................................................................................146
Locating Volumes in a Specified Security Group...................................................................146
Locating Security Groups that Contain a Specified Host........................................................146
Locating Volumes in a Security Group that Contains a Specified Host.....................................146
Locating Ports through Which Hosts Can Access Volumes......................................................147
Locating Security Groups that Contain a Specified Volume....................................................147
Locating Hosts in a Security Group that Contains a Specified Volume.....................................147
Locating Security Groups that Contain a Specified Host Group..............................................148
Locating Security Groups that Contain a Specified LDEV Group.............................................148
Creating a Host Group.....................................................................................................148
Registering Hosts in a Host Group......................................................................................149
Registering Ports in a Host Group.......................................................................................149
Creating an LDEV Group..................................................................................................150
Registering Volumes in an LDEV Group...............................................................................151
Creating a Security Group for Use As an Access Group........................................................151
Registering a Host Group and an LDEV Group in a Security Group........................................152
Creating an LDEV Group..................................................................................................152
Registering Volumes in an LDEV Group...............................................................................153
Creating a Security Group for Use As a Pool Group.............................................................153
Registering an LDEV Group in a Security Group...................................................................154
Protecting Volumes from Copy Operations...............................................................................155
Disabling Volume Security for Mainframe................................................................................155
Editing Security Groups.........................................................................................................156
Unregistering a Host Group...............................................................................................156
Unregistering an LDEV Group............................................................................................156
Renaming a Security Group..............................................................................................156
Deleting a Security Group.................................................................................................157
Registering Hosts to be Attached to the Storage System.........................................................157
Deleting Hosts from Host Groups........................................................................................158
Deleting Ports from Host Groups.........................................................................................158
Renaming Host Groups.....................................................................................................159
Contents
7