HP (Hewlett-Packard) XP24000 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of HP (Hewlett-Packard) XP24000, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of HP (Hewlett-Packard) XP24000 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of HP (Hewlett-Packard) XP24000. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of HP (Hewlett-Packard) XP24000 should contain:
- informations concerning technical data of HP (Hewlett-Packard) XP24000
- name of the manufacturer and a year of construction of the HP (Hewlett-Packard) XP24000 item
- rules of operation, control and maintenance of the HP (Hewlett-Packard) XP24000 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of HP (Hewlett-Packard) XP24000 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of HP (Hewlett-Packard) XP24000, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the HP (Hewlett-Packard) service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of HP (Hewlett-Packard) XP24000.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the HP (Hewlett-Packard) XP24000 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    HP S to r age W or ks XP2 4000/XP20000 V olume S ec ur it y Us er's Gui de Abstract This doc ument de scr ibes and pr o vi des instru ctions f or conf igur ing and perfor ming V olume S ecur ity operati ons on the HP stor age s y stem . P art number : T5 214 -96 0 7 4 Sixth editi on: June 2009[...]

  • Page 2

    Legal and notice information © Cop yr ight 2008- 2009 Hew lett-P ack ard De velopment C ompan y , L .P . Conf idential co mputer softw are . V alid li cense fr om HP r equired f or posse ssion , use or cop ying . Consis tent with F AR 12 .211 and 12 .212 , C ommerc ial C omputer S oftware , Co mputer Softw are Doc umentatio n, and T ec hnical Data[...]

  • Page 3

    C on ten ts 1 Ov ervi e w of V olume Sec ur ity ............................................................... 7 Ove r v ie w ................................................................................................................................... 7 T er minolog y ..........................................................................[...]

  • Page 4

    Locating P or ts thr ough Whic h Hosts C an Acces s V olume s ........................................................ 45 Locating S ecur ity Gro ups that Co ntain a Spec if ied V olume ....................................................... 45 Locating Ho sts in a Sec urity Gr oup that C ontains a S pecif ied V olume ..............................[...]

  • Page 5

    F igur es Sec urity Ex ample 1 ................................................................................................. 10 1 Sec urity Ex ample 2 ................................................................................................. 11 2 Sec urity Ex ample 3 .......................................................................[...]

  • Page 6

    T able s Ac r ony ms and Abbr e vi ations .................................................................................... 73 1 6[...]

  • Page 7

    1 Ov er vie w of V olum e Sec ur it y Unless o therwise s pecif ied , the ter m stor age s ys tem in this guide r ef ers to the f ollo wing disk ar ra y s: • HP Sto rage W orks XP2 4000 Disk Arr a y • HP Sto rage W orks XP20000 Disk Ar ra y • HP Sto rage W orks XP12000 Disk Ar ra y • HP Sto rage W orks XP10000 Disk Ar ra y The G UI illustr [...]

  • Page 8

    r efer r ed to as S - V OLs, or sour ce v olumes . Secondary volumes ar e often r e ferr ed to a s T- V OLs, or tar get vo lumes. Ove r v iew o f V olume S ecur ity 8[...]

  • Page 9

    2 About V olum e Sec ur it y Operations Ov erv ie w of V olume Sec ur it y F uncti ons The V olume Sec ur ity feature pr ot ects data in y our stor age s ys tem fr om I/O oper ati ons perfor med at mainfr ame hos ts. V olume Sec urity enables y ou to a pply sec ur ity to volumes s o that the spec ifi ed mainfr ame hos ts will be una ble to read f r[...]

  • Page 10

    • The v olume lde v4 is accessible onl y fr om hos t4 because lde v4 and hos t4 are r egist ered in the same access gr ou p . • The v olume lde v5 does not belong t o any acce ss gr oups . F or this r eason , hosts in acce ss gr oups cannot acces s ldev5 . lde v5 is only acce ssible fr om ho st5 and host6 , w hic h ar e not r egister ed in acce[...]

  • Page 11

    Figur e 2 Security Example 2 If no ports ar e regis ter ed in a host gr oup , ho sts in the hos t grou p can access v olumes v ia ports to whi ch the ho sts ar e connected . This man ual uses the te rm port-level security , w hich is a s ecur ity polic y for enabling h osts to acce ss vo lumes only v ia po rts registe red in ho st gr oups and th us[...]

  • Page 12

    vo lumes ( vo l_A and vol_B ) in a pool gr ou p, all the mainf rame h osts connect ed to y our stor age s ys tem w ill be unable to access v ol_A and v ol_B . T o registe r volume s in a pool gro up , yo u must c reat e an LDEV gr oup , r egister the v olumes in the LDEV gr oup , and then r egiste r the LDEV gro up in the desir ed pool gr oup . An [...]

  • Page 13

    When appl y ing sec urity , mak e sure that y our s ecur ity settings ar e corr ect . If incorr ec t secur ity settings ar e made, the s y stem w ill be diff ic ult or impos sible to contr ol . If the CPU o f a mainfr ame host is u pgraded after y ou appl y sec ur ity settings, y ou mus t ex ec ute the s ys tem command D M=CP U at the mainfr ame ho[...]

  • Page 14

    • 3 3 90-9 , 3 3 90-9A, 33 90 -9B, 3 3 9 0 -9C • 3 3 90-L, 3 3 9 0 -L A, 3 3 90 -LB, 3 39 0 -L C • 3 3 90-M, 3 3 90 -MA, 3 3 90-MB, 3 3 90-MC • PCB types: V olume Secur ity supports the follo w ing P CB types: • E S CON or A CONAR C • FICON or FIB AR C Max im um P ossible Number o f Gr oups V olume Secur ity enables y ou to c r eate up [...]

  • Page 15

    3 Using th e V olum e Sec ur it y GUI This c hapter e xplains V olume Sec urity w indow and di alog bo xes . T he V olume Sec ur it y W indo w The V olume Sec ur ity windo w ( F igur e 4 ) appears w hen y ou start V olume Sec urity . This w indo w is the starting point f or all the V olume Sec urity oper ations . T o start the V olume Sec ur ity so[...]

  • Page 16

    Figur e 4 The V olume Security Windo w Description Item Displa ys the sec ur ity , hos t, and LDEV gr oup s assigned to eac h LDK C def ined on the stor age s yst em. F or det ails see “ Sec urity Gr oup T r ee ” on page 16. Security Group tree Displa ys the type , model , SEQNUMBER , L ogical P ar tition (LP AR) and ve ndor of each host . F or[...]

  • Page 17

    • Double-clic k Sec urity Gr oup and a list of s ecur ity gro ups appear s. T hen select a ho st gr oup or LDEV gr oup in that sec ur ity group . • Double-clic k Host Gr oup and a lis t of host gr ou ps appears . Then s elect a spec if ic hos t gr oup . • Double-clic k LDEV Gro up . The tr ee v ie w sho ws the ho st gr oup and/or LDEV gr oup [...]

  • Page 18

    Description Icon Indicate s that the secur ity settings in this sec urity gr oup ar e cur re ntly disabled . If y ou enable the sec urity settings , this secur ity gro up is clas sified a s an access gr oup . Also , v olumes in this sec urity gr oup can be used a s secondary volumes (i .e ., copy de stination v olumes) f or copy ope rati ons. Indic[...]

  • Page 19

    Figur e 6 Hosts T able Description Column A sequen tial number as soci ated w ith a host (or c hannel ext ender). No. T ype and model number o f a host (or a c hannel e xtender). T ype/Mod el Node ID of a hos t (or a channel e xtender ) . SEQNUMBER The logi cal partition number of a h ost . LP AR The ho st ve ndor . V endors inc lude FJT (F ujitsu)[...]

  • Page 20

    Figur e 7 LDEV table Description Column The v olume ID (in hex adec imal fr om 00 to FF) NO TE: A vo lume ID ending in # (f or e xam ple , 00#) indica tes , the v olume is an e xter nal vo lume. LDEV The em ulation type o f the volume Emulation The v olume statu s: • An ast erisk (*) den otes a secondary vo lume (copy des tination) fo r USP V/VM [...]

  • Page 21

    Figur e 8 The Add/Change Security Group Dialog Box Description Item Indicate s the selected LDK C number . LDK C Desc ripti ve inf ormati on about the sec ur ity groups in the LDK C. • Security indicates w hether the sec urity settings in the s ecur ity grou p are Enabled o r Disabled. CA UTION: It is possibl e that sec ur ity settings ar e disab[...]

  • Page 22

    Description Item When c reating a ne w sec urity gr oup , yo u enter the name of the s ecur ity group in this Enter Security Group te xt box . When r enaming an e xis ting secur ity grou p, y ou se lect the sec urity gr oup in the Security Group List table and then ent er a new name . The f ollo wing con v entions appl y to sec urity gr oup names: [...]

  • Page 23

    Description Item When se ttings of the selected s ecur ity grou ps are c hanged, c lic k Change to make the c hanges appear in the Sec urity Gr oup L ist table . Change Applie s settings in the Add/Change S ecur ity Grou p dialog bo x to the V olume Sec ur ity windo w , and then clo ses the dialog bo x . CA UTION: Cli cking OK ap plies t he setting[...]

  • Page 24

    Figur e 9 The Add/Change Host Group Dialog Bo x Description Item Indicate s the selected LDK C number . LDK C A list of ho st gr oups in the LDK C. Host Gr oup L ist When c reating a ne w hos t grou p, y ou ente r the name of the host gr oup in this Enter Ho st Group te xt bo x. When r enaming an e x isting host gr oup , y ou select the h ost gr ou[...]

  • Page 25

    Description Item This butto n applies settings in the A dd/Change Host Gr ou p dialog box t o the V olume Sec urity w indow , and then closes the A dd/Change Hos t Grou p dialog box . CA UTION: The OK b utton a pplies t he settings t o the V olume Sec urity w indo w , but does not appl y the s ettings to t he stor age sy stem . T o appl y the setti[...]

  • Page 26

    Figur e 10 The Add/Change LDEV Group Dialog Bo x Description Item Indicate s the number of the selec ted LDK C. LDK C A list of LDEV gr oup s in the LDK C. LDEV Gr oup L ist When c reating a ne w LDEV gr oup , yo u enter the name of the LDEV gr oup in this Enter LDEV Group te xt box . When r enaming an e xis ting LDEV grou p, y ou selec t the LDEV [...]

  • Page 27

    Description Item This butto n applies settings in the A dd/Change LDEV Gr oup dialog bo x to the V olume Sec urity w indow , and then closes the A dd/Change LDEV Gr oup dialog bo x . CA UTION: The OK b utton a pplies t he settings t o the V olume Sec urity w indo w , but does not appl y the s ettings to t he stor age sy stem . T o appl y the settin[...]

  • Page 28

    Description Item Spec ify the name of the host gr ou p in whic h hosts w ill be r egister ed. Host Group List Host inf ormati on. • No. A s equential n umber assoc iated w ith a hos t. NO TE: Ea ch ta ble r o w usuall y sho ws inf orm ation a bout a ho st . How e ve r , if a hos t is attac hed to the s tor age s y stem v ia a c hannel e xtend er [...]

  • Page 29

    Description Item Applie s settings in the Add/Change Ho st dialog bo x to the V olume Secur ity windo w , and then clo ses the dialog bo x . CA UTION: Cli cking OK ap plies t he settings t o the V olume Secur ity w indo w , but does n ot appl y the setting s to the st or age s ys tem . T o a pply t he sec urity setting s to the s tor age s y stem ,[...]

  • Page 30

    Description Item Lis ts volume s regist ered in the LDEV gr oup . One ta ble ro w indicate s one volume . • The LDE V column indicates LDEV n umbers. NO TE: If a vo lume ID is displa yed w ith a poun d sign (f or ex am ple , 00#) , the v olume is an e xter nal vo lume. • The Emulation column indi cates emulati on types o f volumes . If an aster[...]

  • Page 31

    Figur e 13 The Select P ort Dialog Box Description Item Indicate s the number of the selec ted LDK C LDK C Spec ifi es a host gr ou p in whic h ports will be r egiste red . Host Group Sho ws the r egister ed ports in the host gr oup: • LDEV displa ys the LDEV n umbers. NO TE: When t he dialog bo x ope ns for t he fir st time , the P ort list does[...]

  • Page 32

    Description Item Applie s settings in the Select P ort dialog bo x to the V olume Secur ity windo w , and then clo ses the Selec t P ort dialog bo x. CA UTION: Cli cking OK ap plies t he settings t o the V olume Secur ity w indo w , but does n ot appl y the se ttings to th e stor age s y stem . T o appl y the sec ur it y setting s to the su bs ys t[...]

  • Page 33

    Description Item Discar ds settings in the Spec ify Sec urity Gr oup dialog bo x and clo ses the dialog bo x. Cancel T he Hos t to Sec ur it y Gr o up Dialog Bo x The Ho st to Sec ur ity Group di alog box ( F igure 15 ) a ppears whe n you do e ither of the f ollo wing in the V olume Secur ity windo w ( F i gure 4 ): • whe n you r igh t -cli ck a [...]

  • Page 34

    Description Item Pr ov ides inf ormati on about a hos t, w her e the number gr oups , fr om left to r ight , indicate: • First : T he T ype/Model the type and model n umber of a host (o r a channel e xtender ) . • Second : The Node ID of a h ost (or a c hannel exte nder). • Thir d : The L ogical P ar tition Number o f the host . • Fourth : [...]

  • Page 35

    Figur e 16 The Host to LDEV Dialog Bo x Description Item Indicate s the number of the selec ted LDK C LDK C Pr ov ides inf ormati on about a hos t, w her e the number gr oups , fr om left to r ight , indicate: • First : T he T ype/Model the type and model n umber of a host (o r a channel e xtender ) . • Second : The Node ID of a h ost (or a c h[...]

  • Page 36

    Figur e 17 The Host Group to Security Gr oup Dialog Box Description Item Indicate s the number of the selec ted LDK C LDK C Spec ifi es a host gr ou p. Host Group Lis ts infor mation abou t the secur ity grou ps in whi ch the spec if ied host gr ou p is regist ered . • Security Group indicate s the name of a sec urity gr oup . • Security indica[...]

  • Page 37

    Figur e 18 The Host Group to P ort Dialog Box Description Item Indicate s the number of the selec ted LDK C. LDK C Pr ov ides inf ormati on about a hos t gro up, w her e the number gr oups , fr om left to r ight , indicate: • First : T he T ype/Model the type and model n umber of a host (o r a channel e xtender ) . • Second : The Node ID of a h[...]

  • Page 38

    Figur e 19 The LDEV to Security Group Dialog Bo x Description Item Indicate s the number of the selec ted LDK C. LDK C Spec ifi es a CU image number . CU Desc ribes the a vailable LDEVs: • LDEV indicat es a number as signed to the LDEV . • Emulatio n indicates the em ulation types o f the volume . NO TE: A vo lume ID ending in # (f or e xam ple[...]

  • Page 39

    • whe n you r igh t -cli ck an ite m in the tree v ie w and then se lect List -> LDEV t o Host fro m the pop-up menu . T he List ->LDEV t o Host pop-up command does not displa y if y ou double -cli ck a sec ur ity gr oup and then r ight-cli ck a ho st gr oup or LDEV gr oup f ro m immediatel y belo w the secur ity gr oup . This di alog box e[...]

  • Page 40

    Description Item Lis ts hosts in the sec ur ity group in w hic h the spec ified v olume is r egister ed. • No . A sequen tial number as soci ated w ith a host . NO TE: Ea ch ta ble r o w usuall y sho ws inf orm ation a bout a ho st . How e ve r , if a hos t is attac hed to the disk su bs ys tem v ia a ch annel e xtende r , the ta ble r o w sho ws[...]

  • Page 41

    Figur e 21 The LDEV Gr oup to Security Group Dialog Box Description Item Indicate s the number of the selec ted LDK C. LDK C Spec ifi es an LDEV gr oup . LDEV Gr oup Lis ts infor mation abou t the secur ity grou ps in whi ch the spec if ied LDEV gr oup is r e - gister ed . • Security Group indicate s the name of a sec urity gr oup . • Security [...]

  • Page 42

    Figur e 22 T he Error Detail Dialog Bo x Description Item Lis ts the number of the ho st av ailable on the selec ted LDK C w hich ar e perfo rming I/O oper ations. Host Indicate s the number of the selec ted LDK C. LDK C Spec ifi es a Command U nit image and for ces the displa y of an y volumes o n whic h the host is pe rforming I/O oper atio ns an[...]

  • Page 43

    4 P er for ming V olume Sec urity O per ations This c hapter e xplains the f ollow ing V olume Sec urity oper ations: • La unching V olume Sec urity (see L aunching V olume Sec ur it y , page 43) • Vi ew ing Sec ur ity Settings (see V ie wing Sec ur ity Settings , page 43) • Enabling onl y the spec ifi ed hosts to acce ss certain vo lumes, so[...]

  • Page 44

    • Locating P or ts thr ough Whic h Hosts C an Acces s V olume s (see “ Locating P or ts thr ough Whic h Hosts C an Acces s V olume s ” on page 45) • Locating S ecur ity Gro ups that Co ntain a Spec if ied V olume (see “ Locating S ecur ity Gro ups that Co ntain a Spec if ied V olume ” on page 45) • Locating Ho sts in a Sec urity Gr ou[...]

  • Page 45

    The Ho st to LDEV dialog bo x appear s ( F igur e 16 ) . The di alog box dis play s a list of v olumes . 3. R igh t -cli ck an ar ro w at the r ight end o f the CU drop-do w n list , and then see ho w man y CU image number s appear . • If only o ne CU image number appear s, the table in the di alog box dis play s all the vo lumes that y ou want .[...]

  • Page 46

    2. F r om the pop-up men u , select L ist -> LDEV to Security Group . The LDEV t o Secur ity Gr oup dialog bo x appears ( F igure 19 ). The ta ble on the ri ght displa ys the sec urity gr oups that y ou w ant . If the desir ed vo lume is not displa yed in the lo w er -ri ght table: 1. In the tr ee vi ew o f the V olume S ecur ity windo w ( F igu[...]

  • Page 47

    L ocating Sec ur ity Gro ups that C ontain a S pec if ied LDEV Gr oup T o specify an LDEV gr oup and then f ind sec urity gr oups in w hic h the spec if ied LDEV gr oup is r egister ed , fo llow the pr ocedur e belo w: 1. In the tr ee vi ew o f the V olume S ecur ity windo w ( F igur e 4 ), righ t -cli ck an it em ex cept f or a host gr oup or LDEV[...]

  • Page 48

    The A dd/Change Hos t Grou p dialog bo x ( F igur e 9 ) appears . 5 . In the Enter Host Group box , enter the name o f the host gr oup that y ou w ant to c r eate, and the n cli ck the Add bu tton. NO TE: Host gr o up names can be u p to ei ght ch arac ter s and ar e case-sensiti v e. T he f irst c har acte r and the la st char ac ter m ust no t be[...]

  • Page 49

    If no ports ar e regis ter ed in the display ed hos t gro up , yo u can regist er the follo w ing hos ts: • hos ts that do not belong to an y hos t gro up • hos ts belonging to hos t gro ups in whi ch n o ports are r egister ed Ho we v er , you cann ot regis ter hos ts belonging to hos t gr oups in w hic h ports are r egister ed . 6. Se lect Re[...]

  • Page 50

    If hos ts regist er ed in the host gr oup ar e also r egiste red in ano ther host gr ou p, y ou canno t regis ter ports in the P ort list in the Register ed port box , and thus y ou cannot imple ment port-leve l sec urity . 6. Cli ck OK in the S elect P ort dialog bo x. The S elect P ort dialog bo x clos es and y ou are r etur ned to the V olume Se[...]

  • Page 51

    CA UTION: Her e , the se ttings in the w indo w hav e not bee n appli ed to the st or age s y stem . 7 . Clic k Apply in the V olume Sec urity w indow ( F igure 4 ). A message a ppears and asks if y ou w ant to appl y the settings to the st orage s y stem . 8. Cli ck Y es . The s ettings are a pplied to the st orage s y stem . R egister ing V olume[...]

  • Page 52

    A mess age appears and asks if y ou w ant to appl y the settings to the st orage s y stem . 10. Cli ck Y es . The s ettings are a pplied to the st orage s y stem . Cr eating a Sec ur ity Gr oup f or Us e As an Acce ss Gr ou p T o make sec ur ity settings, y ou mus t cr eate sec ur ity group s. Sec ur ity group s can be clas sified a s access gr oup[...]

  • Page 53

    R egister ing a Ho st Gr ou p and an LDEV Gr oup in a S ec urity Gr ou p No w that yo u hav e classif ied y our sec ur ity grou p as an access gr oup , y our ne xt (and the last) ta sk is to r egister y our ho st gr oup and LDEV gr oup into the s ecur ity gr oup . When y ou f inish regis trati on, the vo lumes in the LDEV gr oup ar e sec ured and c[...]

  • Page 54

    The f ollo w ing procedur e e xplains ho w to cr eate an LDEV gr oup . For de tails on ho w to r egister v olumes in an LDEV gr oup , see “ R egister ing V olumes in an LDEV Gr oup ” on page 54. CA UTION: When c r eating an LDEV gr oup , you ar e str on gly r ecommend ed to cli ck the Appl y butto n in the V olume Secur ity win do w , as desc r[...]

  • Page 55

    CA UTION: When r egister ing vo lumes in an LDEV gr oup , y ou ar e str ongl y r ecommended t o cli ck the Appl y butto n in the V olume Sec urity w indo w , as des cr ibed in the la st step o f the f ollo wing p r ocedur e. If y ou f or get to c lick Appl y , the v olumes migh t be unr egister ed w hen y ou encoun ter an er r or r egist er ing the[...]

  • Page 56

    4. Select A dd/Change fro m the pop-up menu . The A dd/Change Sec ur ity Group di alog box ( F igure 8 ) a ppears. 5 . In the Enter Security G roup bo x, en ter the name of the sec ur ity group that y ou w ant to c r eate. NO TE: Secur ity gr oup n ames can be up to e igh t char acte rs and ar e ca se-sensitiv e . The f ir st char ac ter and the l [...]

  • Page 57

    5. U se the Select Sec urity Group dr op-dow n list to s elect a sec ur ity group in w hic h y ou want t o regis ter an LDEV gr oup . 6. Us e the LDEV Group dr op-dow n list to s elect an LDEV gr oup that y ou w ant to r egister in the sec ur ity gr oup , and then cli ck OK . 7 . Clic k Apply in the V olume Sec urity w indow ( F igure 4 ). A messag[...]

  • Page 58

    TIP: T o make v olumes in y our sec ur it y gr ou p usab le as secon dary volumes (t hat is, cop y de stinatio n vo lumes) fo r cop y oper atio ns, y ou mu st selec t the sec urity gr ou p in the Add/C hange Sec urity Gr ou p dialog bo x ( F i gur e 8 ) and then se lect Enable in the T - V OL/R- V OL bo x. Ne xt , cli ck Change and the n OK . F ina[...]

  • Page 59

    E diting Sec ur ity Gr oup s This s ection e xplains the f ollo wing oper ati ons, w hic h allow y ou to edit y our sec ur ity grou ps: • Unr egister ing a hos t grou p fr om a sec ur ity group (s ee “ Unregis ter ing a Host Gr oup ” on page 59) • Unr egister ing an LDEV gr oup fr om a s ecur ity gro up (see “ Unr egister ing an LDEV Gr o[...]

  • Page 60

    CA UTION: Her e , the c hanges in the w indo w ha ve no t been app lied to th e stor age s y stem . 6. Cli ck Appl y in the V olume Secur ity windo w ( F i gure 4 ). A mess age appears and asks if y ou w ant to appl y the changes to the s tor age sy st em. 7 . Clic k Y es . The c hanges ar e applied to the s tor age sy st em. R enaming Sec ur ity G[...]

  • Page 61

    Deleting Sec ur ity Gr oup s T o delete a sec urity gr oup , tak e the follo w ing step s: T o delete a sec urity gr oup: 1. Ensur e that you ar e in Modify mode . 2. In the V olume Sec urity w indo w ( F igur e 4 ) , double -cli ck an LDK C number . 3. Do e ither of the f ollo wing: • R ight-cli ck a sec ur ity group in the tr ee v ie w . • R [...]

  • Page 62

    D M=CPU This co mmand display s the type , the model numbe r , the node ID and the logical partition number of the ho st . W r ite do wn the inf ormati on on a paper s o that you w ill not f or get it . F or details on the s y stem co mmand, see the doc umentati on f or sy ste m commands. 2. Ensur e that y ou ar e in Modify mode. 3. In the V olume [...]

  • Page 63

    3. R igh t -cli ck a ho st gr oup . A pop-up menu a ppears. 4. Select Specify and then Host f ro m the pop-up menu . The A dd/Change Hos t dialog bo x ( F igur e 11 ) appears and displa y s a list of ho sts. T he icons and indicate hos ts regis ter ed in the spec ifi ed host gr oup . 5. S elect and then r ight c lic k one or mor e hos ts (indicated[...]

  • Page 64

    CA UTION: Her e , the se ttings in the w indo w hav e not bee n appli ed to the st or age s y stem . 7 . Clic k Apply in the V olume Sec urity w indow ( F igure 4 ). A mess age appears and asks if y ou w ant to appl y the settings to the st orage s y stem . 8. Cli ck Y es . The s ettings are a pplied to the st orage s y stem . R enaming Hos t Gr ou[...]

  • Page 65

    Deleting Hos t Gr oup s T o delete a host gr oup , tak e the f ollo wing s teps . T o delete a host gr oup: 1. Ensur e that you ar e in Modify mode . 2. In the V olume Sec urity w indo w ( F igur e 4 ) , double -cli ck an LDK C number . 3. Do e ither of the f ollo wing: • R ight-cli ck a hos t gro up in the tr ee vi ew . • R ight-cli ck Host Gr[...]

  • Page 66

    The tw o bo xes be low the dr op-do wn lis t display s v olumes in the spec if ied CU image . • The R egistered in LDEV gr oup bo x displa ys v olumes r egister ed in the LDEV gr oup . • The Not r egistered in LDEV gr oup box displa ys v olumes that ar e not r egist ered in the LDE V gr oup . 6. In the Register ed in LDEV group box , selec t vo[...]

  • Page 67

    CA UTION: Her e , the c hange in the w indo w has n ot been app lied to t he stor age s y ste m. 9 . Cli ck Appl y in the V olume S ecur ity windo w ( F i gure 4 ). A message a ppears and asks if y ou w ant to appl y the change to the s torage s y stem . 10. Cli ck Y es . The c hange is applied t o the stor age sy st em. Deleting LDEV Gr ou ps T o [...]

  • Page 68

    P erforming V olume Secur ity Oper ations 6 8[...]

  • Page 69

    5 T r oubleshooting T r ou bleshooting V olume Sec ur it y The Er r or Detail dialog bo x ( F igur e 2 2 ) ma y appear whe n you atte mpt to appl y secur ity settings . The pr obable caus es of the er ror ar e: • Some ho sts in one sec ur ity group ar e acces sing volume s in another sec ur it y gr oup . • Some ho sts do not belong t o any s ec[...]

  • Page 70

    • The co ntent of an y er ro r message(s) displa y ed on the Remo te W eb C onsole com puter . • The S tor age Nav igato r confi gurati on infor mation (u se the FD Dump T ool) . • The s ervice inf ormati on mess ages (SIMs), including r ef ere nce codes and se ver ity lev els, dis play ed by the R emote W eb Cons ole compute r . • The V ol[...]

  • Page 71

    6 Suppor t and Ot her Resour ces R elated Doc umentati on • HP Sto rage W orks XP2 4000/XP20000 Disk Arr a y Owne r's Guide • Hitac hi Shado wImage ™ for Mainf rame Us er's Guide • Hitac hi T r ueCop y ™ for Mainf rame U ser's Guide Y ou can f ind these doc uments on the HP Manuals w ebsit e: http://www .hp.co m/support/man[...]

  • Page 72

    • Err or mes sages • Oper ating sy st em type and r ev ision le v el • Detailed ques tions Sub sc r ipti on Se r v i ce HP r ecommends that y ou r egister y our pr oduct at the Sub scr iber ’ s C hoi ce for Bu siness w ebsite: http://www .hp.co m/go/e -updates After r egist ering , y ou w ill rece iv e email notif icati on of pr oduct e nha[...]

  • Page 73

    A Ac r on yms and Abbr e v iations T able 1 Acron yms and Abbre viations logical de vi ce LDEV logical disk contr oller LDK C main vo lume M- V OL Multiple Virtual St orage (IB M) MVS perso nal computer PC prin ted cir c uit board PCB r emote serv ice infor mation mes sage R -S IM r emote vo lume R- V OL HP Stor age W orks XP B usiness C opy So ftw[...]

  • Page 74

    Ac ron y ms and Abbr ev iatio ns 7 4[...]

  • Page 75

    Inde x A access gr oup , 9 Add/C hange Host dialog bo x , 2 7 Add/C hange Host Gr oup dialog bo x , 2 4 Add/C hange LDEV Grou p dialog bo x, 2 6 Add/C hange Secur ity Gr oup dialog bo x , 21 C con venti ons stor age capac ity values , 71 D dev i ce emulation ty pes, 13 dialog bo x es Add/C hange Host dialog bo x , 2 7 Add/C hange Host Gr oup dialog[...]

  • Page 76

    P pool gr oup , 11 port-leve l secur ity o verv ie w , 10 R R -V OL , 12 r elated doc umentatio n, 71 S secondary vo lume, 12 Sec urity disabling , 5 8 polic y , 7 sec urity enabling the spec if ied ho sts to access vo lumes, 4 7 e xample , 10 , 11 , 12 pr ohibiting all ho sts fr om accessing LDE Vs, 5 3 pr otecting v olumes f rom cop y oper ations[...]