HP (Hewlett-Packard) STORAGEWORKS XP20000 user manual

User manual for the device HP (Hewlett-Packard) STORAGEWORKS XP20000

Device: HP (Hewlett-Packard) STORAGEWORKS XP20000
Category: Computer Accessories
Manufacturer: HP (Hewlett-Packard)
Size: 1.23 MB
Added : 12/15/2013
Number of pages: 76
Print the manual

Download

How to use this site?

Our goal is to provide you with a quick access to the content of the user manual for HP (Hewlett-Packard) STORAGEWORKS XP20000. Using the online preview, you can quickly view the contents and go to the page where you will find the solution to your problem with HP (Hewlett-Packard) STORAGEWORKS XP20000.

For your convenience

If looking through the HP (Hewlett-Packard) STORAGEWORKS XP20000 user manual directly on this website is not convenient for you, there are two possible solutions:

  • Full Screen Viewing - to easily view the user manual (without downloading it to your computer), you can use full-screen viewing mode. To start viewing the user manual HP (Hewlett-Packard) STORAGEWORKS XP20000 on full screen, use the button Fullscreen.
  • Downloading to your computer - You can also download the user manual HP (Hewlett-Packard) STORAGEWORKS XP20000 to your computer and keep it in your files. However, if you do not want to take up too much of your disk space, you can always download it in the future from ManualsBase.
HP (Hewlett-Packard) STORAGEWORKS XP20000 User manual - Online PDF
Advertisement
« Page 1 of 76 »
Advertisement
Print version

Many people prefer to read the documents not on the screen, but in the printed version. The option to print the manual has also been provided, and you can use it by clicking the link above - Print the manual. You do not have to print the entire manual HP (Hewlett-Packard) STORAGEWORKS XP20000 but the selected pages only. paper.

Summaries

Below you will find previews of the content of the user manuals presented on the following pages to HP (Hewlett-Packard) STORAGEWORKS XP20000. If you want to quickly view the content of pages found on the following pages of the manual, you can use them.

Abstracts of contents
Summary of the content on the page No. 1

HP StorageWorks
XP24000/XP20000 Volume Security User's
Guide
Abstract
This document describes and provides instructions for configuring and performing Volume Security operations
on the HP storage system.
Part number: T5214-96074
Sixth edition: June 2009

Summary of the content on the page No. 2

Legal and notice information © Copyright 2008-2009 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties

Summary of the content on the page No. 3

Contents 1 Overview of Volume Security ............................................................... 7 Overview ................................................................................................................................... 7 Terminology ............................................................................................................................... 7 2 About Volume Security Operations ....................................................... 9 Overview of Volum

Summary of the content on the page No. 4

Locating Ports through Which Hosts Can Access Volumes ........................................................ 45 Locating Security Groups that Contain a Specified Volume ....................................................... 45 Locating Hosts in a Security Group that Contains a Specified Volume ........................................ 46 Locating Security Groups that Contain a Specified Host Group ................................................. 46 Locating Security Groups that Contain a Spec

Summary of the content on the page No. 5

Figures 1 Security Example 1 ................................................................................................. 10 2 Security Example 2 ................................................................................................. 11 3 Security Example 3 ................................................................................................. 12 4 The Volume Security Window ................................................................................... 16 5 Security

Summary of the content on the page No. 6

Tables 1 Acronyms and Abbreviations .................................................................................... 73 6

Summary of the content on the page No. 7

1 Overview of Volume Security Unless otherwise specified, the term storage system in this guide refers to the following disk arrays: • HP StorageWorks XP24000 Disk Array • HP StorageWorks XP20000 Disk Array • HP StorageWorks XP12000 Disk Array • HP StorageWorks XP10000 Disk Array The GUI illustrations in this guide were created using a Windows computer with the Internet Explorer browser. Actual windows may differ depending on the operating system and browser used. GUI contents also vary with lic

Summary of the content on the page No. 8

referred to as S-VOLs, or source volumes. Secondary volumes are often referred to as T-VOLs, or target volumes. 8 Overview of Volume Security

Summary of the content on the page No. 9

2 About Volume Security Operations Overview of Volume Security Functions The Volume Security feature protects data in your storage system from I/O operations performed at mainframe hosts. Volume Security enables you to apply security to volumes so that the specified mainframe hosts will be unable to read from and write to the specified volumes. Volume Security also enables you to prevent data on volumes from being overwritten by erroneous copy operations. Volume Security can be used in conjuncti

Summary of the content on the page No. 10

• The volume ldev4 is accessible only from host4 because ldev4 and host4 are registered in the same access group. • The volume ldev5 does not belong to any access groups. For this reason, hosts in access groups cannot access ldev5. ldev5 is only accessible from host5 and host6, which are not registered in access groups. Figure 1 Security Example 1 Port-Level Security Usually, hosts are connected to two or more ports via cables and have access to volumes via these ports. In the security example i

Summary of the content on the page No. 11

Figure 2 Security Example 2 If no ports are registered in a host group, hosts in the host group can access volumes via ports to which the hosts are connected. This manual uses the term port-level security, which is a security policy for enabling hosts to access volumes only via ports registered in host groups and thus prohibiting hosts to access the volumes via other ports. CAUTION: Before you apply security, you should confirm what hosts are performing I/O operations on volumes in access groups

Summary of the content on the page No. 12

volumes (vol_A and vol_B) in a pool group, all the mainframe hosts connected to your storage system will be unable to access vol_A and vol_B. To register volumes in a pool group, you must create an LDEV group, register the volumes in the LDEV group, and then register the LDEV group in the desired pool group. Any pool group can only contain one LDEV group. In Figure 3, a pool group is created. Volumes in this pool group (that is, ldev7, ldev8, and ldev9) are inaccessible from all the hosts: Figur

Summary of the content on the page No. 13

When applying security, make sure that your security settings are correct. If incorrect security settings are made, the system will be difficult or impossible to control. If the CPU of a mainframe host is upgraded after you apply security settings, you must execute the system command D M=CPU at the mainframe host to obtain the latest information about the host. Next, you must use the latest information to update host information in the Add/Change Host dialog box (for details, see “The Add/Change

Summary of the content on the page No. 14

• 3390-9, 3390-9A, 3390-9B, 3390-9C • 3390-L, 3390-LA, 3390-LB, 3390-LC • 3390-M, 3390-MA, 3390-MB, 3390-MC • PCB types: Volume Security supports the following PCB types: • ESCON or ACONARC • FICON or FIBARC Maximum Possible Number of Groups Volume Security enables you to create up to 128 security groups per storage system, and up to 64 security groups per LDKC. Security groups are classified into access groups and pool groups: • One access group can contain only one host group and one LDEV grou

Summary of the content on the page No. 15

3 Using the Volume Security GUI This chapter explains Volume Security window and dialog boxes. The Volume Security Window The Volume Security window (Figure 4) appears when you start Volume Security. This window is the starting point for all the Volume Security operations. To start the Volume Security software: 1. Log on to the disk array to open the Remote Web Console main window. For details, see the HP StorageWorks XP24000/XP20000 Remote Web Console User’s Guide. 2. Click Go, Mainframe Connec

Summary of the content on the page No. 16

Figure 4 The Volume Security Window Item Description Displays the security, host, and LDEV groups assigned to each LDKC defined on the Security Group tree storage system. For details see “Security Group Tree ” on page 16. Displays the type, model, SEQNUMBER, Logical Partition (LPAR) and vendor of each Hosts table host. For details, see “Hosts Table” on page 18. Allows you to select the desired command unit(s) available in each group. When you CU list select a CU image, the table below shows a li

Summary of the content on the page No. 17

• Double-click Security Group and a list of security groups appears. Then select a host group or LDEV group in that security group. • Double-click Host Group and a list of host groups appears. Then select a specific host group. • Double-click LDEV Group. The tree view shows the host group and/or LDEV group registered in the security group. Figure 5 Security Group Tree Icon Description Indicates an access group whose volumes can be used as secondary volumes (i.e., copy destination volumes) for co

Summary of the content on the page No. 18

Icon Description Indicates that the security settings in this security group are currently disabled. If you enable the security settings, this security group is classified as an access group. Also, volumes in this security group can be used as secondary volumes (i.e., copy destination volumes) for copy operations. Indicates that the security settings in this security group are currently disabled. If you enable the security settings, this security group will be classified as an access group. Also

Summary of the content on the page No. 19

Figure 6 Hosts Table Column Description No. A sequential number associated with a host (or channel extender). Type/Model Type and model number of a host (or a channel extender). SEQNUMBER Node ID of a host (or a channel extender). LPAR The logical partition number of a host. The host vendor. Vendors include FJT (Fujitsu), IBM, HTC (Hitachi), and CNT(Ex). Vendor If CNT(Ex) appears, the table row indicates the type, model number, and node ID of a channel extender. If you make any change to a host,

Summary of the content on the page No. 20

Figure 7 LDEV table Column Description The volume ID (in hexadecimal from 00 to FF) NOTE: LDEV A volume ID ending in # (for example, 00#) indicates , the volume is an external volume. The emulation type of the volume Emulation The volume status: • An asterisk (*) denotes a secondary volume (copy destination) for USP V/VM Attribute copy software. • A plus symbol (+) denotes that one or more LU paths are assigned to the volume. The Add/Change Security Group Dialog Box The Add/Change Security Group


Alternative user manuals
# User manual Category Download
1 HP (Hewlett-Packard) 326431 User manual Computer Accessories 0
2 HP (Hewlett-Packard) DESKJET 710C User manual Computer Accessories 20
3 HP (Hewlett-Packard) Hewlett-Packard16047C User manual Computer Accessories 1
4 HP (Hewlett-Packard) Hewlett-PackardE200 User manual Computer Accessories 1
5 HP (Hewlett-Packard) Hewlett-PackardSwitch yl Module User manual Computer Accessories 0
6 HP (Hewlett-Packard) HP 16500C User manual Computer Accessories 11
7 HP (Hewlett-Packard) HP Microsoft Windows Server 2008 R2 Standard Edition 589256-B21 User manual Computer Accessories 5
8 HP (Hewlett-Packard) 4036 QDR User manual Computer Accessories 5
9 HP (Hewlett-Packard) Hewlett-Packard11689A User manual Computer Accessories 0
10 HP (Hewlett-Packard) Compaq Microtower Business PC DX2300 User manual Computer Accessories 9
11 HP (Hewlett-Packard) 5992-3838 User manual Computer Accessories 1
12 HP (Hewlett-Packard) Hewlett-Packard11864A User manual Computer Accessories 0
13 HP (Hewlett-Packard) Hewlett-Packard370971-004 User manual Computer Accessories 0
14 HP (Hewlett-Packard) HP Drive Enclosure AP844B User manual Computer Accessories 16
15 HP (Hewlett-Packard) Hewlett-Packard11688A User manual Computer Accessories 0
16 Sony VGC-RB50(G) User manual Computer Accessories 1
17 Sony Movie Studio HD Platinum Suite 11 MSPSMS11000 User manual Computer Accessories 177
18 Sony Hi-MD Walkman MCMD-R1 User manual Computer Accessories 7
19 Sony Sound Forge V.10.0 Pro SF-10000 User manual Computer Accessories 435
20 Sony Rechargable Battery Pack VGP-BPSC31 User manual Computer Accessories 23