beautypg.com

HP STORAGEWORKS XP24000 User Manual

Page 3

background image

Contents

1 Overview of Volume Security ............................................................... 7

Overview ................................................................................................................................... 7
Terminology
............................................................................................................................... 7

2 About Volume Security Operations ....................................................... 9

Overview of Volume Security Functions .......................................................................................... 9
Protecting Volumes from I/O Operations at Mainframe Hosts
........................................................... 9

Enabling Only the Specified Hosts to Access Volumes ............................................................... 9
Port-Level Security ............................................................................................................... 10
Port-Level Security Implementation
......................................................................................... 10
Prohibiting All Hosts from Accessing Volumes ......................................................................... 11
Protecting Volumes from Erroneous Copy Operations .............................................................. 12

Warnings Regarding Volume Security .......................................................................................... 12
Supported Volume Emulation Types ............................................................................................. 13
Maximum Possible Number of Groups ......................................................................................... 14
Maximum Possible Number of Hosts and Volumes
........................................................................ 14

3 Using the Volume Security GUI .......................................................... 15

The Volume Security Window ..................................................................................................... 15
Security Group Tree ................................................................................................................. 16
Hosts Table .............................................................................................................................. 18
LDEVs Table ............................................................................................................................ 19
The Add/Change Security Group Dialog Box ............................................................................... 20
The Add/Change Host Group Dialog Box ................................................................................... 23
The Add/Change LDEV Group Dialog Box .................................................................................. 25
The Add/Change Host Dialog Box ............................................................................................. 27
The Select LDEV Dialog Box ....................................................................................................... 29
The Select Port Dialog Box ......................................................................................................... 30
The Specify Security Group Dialog Box ....................................................................................... 32
The Host to Security Group Dialog Box ........................................................................................ 33
The Host to LDEV Dialog Box ...................................................................................................... 34
Host Group to Security Group Dialog Box .................................................................................... 35
The Host Group to Port Dialog Box .............................................................................................. 36
The LDEV to Security Group Dialog Box ....................................................................................... 37
The LDEV to Host Dialog Box ...................................................................................................... 38
The LDEV Group to Security Group Dialog Box ............................................................................. 40
The Error Detail Dialog Box ........................................................................................................ 41

4 Performing Volume Security Operations ............................................... 43

Launching Volume Security ......................................................................................................... 43
Viewing Security Settings
........................................................................................................... 43

Locating Volumes in a Specified Security Group ..................................................................... 44
Locating Security Groups that Contain a Specified Host
........................................................... 44
Locating Volumes in a Security Group that Contains a Specified Host
........................................ 44

XP24000/XP20000 Volume Security User's Guide

3

This manual is related to the following products: