Instruction d'utilisation HP (Hewlett-Packard) STORAGEWORKS XP24000

Instruction d'utilisation pour le dispositif HP (Hewlett-Packard) STORAGEWORKS XP24000

Dispositif: HP (Hewlett-Packard) STORAGEWORKS XP24000
Catégorie: Accessoires d'ordinateur
Fabricant: HP (Hewlett-Packard)
Dimension: 1.23 MB
Date d'addition: 12/15/2013
Nombre des pages: 76
Imprimez l'instruction

Téléchargez

Comment utiliser?

Notre objectif consiste à vous assurer le plus rapide accès au contenu de l'instruction d'utilisation du dispositif HP (Hewlett-Packard) STORAGEWORKS XP24000. En utilisant l'aperçu en ligne vous pouvez parcourir le sommaire et passer à la page où vous trouverez la résolution de votre problème avec HP (Hewlett-Packard) STORAGEWORKS XP24000.

Pour votre confort

Si regarder l'instruction HP (Hewlett-Packard) STORAGEWORKS XP24000 directement sur la page n'est pas confortable pour vous, vous pouvez profiter de deux solutions possibles:

  • Exploration au mode de plein écran - pour analyser l'instruction d'une manière commode (sans l'avoir téléchargée sur votre ordinateur) vous pouvez utiliser le mode d'exploration en plein écran. Pour démarrer l'exploration de l'instruction HP (Hewlett-Packard) STORAGEWORKS XP24000 en plein écran, utilisez le bouton Plein écran.
  • Téléchargement sur l'ordinateur - vous pouvez aussi télécharger l'instruction HP (Hewlett-Packard) STORAGEWORKS XP24000 sur votre ordinateur et la sauvegarder dans vos ressources. Si vous n'avez pas envie de gaspiller votre espace disque, vous pouvez toujours télécharger cette instruction du ManualsBase dans l'avenir.
HP (Hewlett-Packard) STORAGEWORKS XP24000 Manuel d'utilisation - Online PDF
Advertisement
« Page 1 of 76 »
Advertisement
Version imprimée

Beaucoup de gens préfèrent de lire les documents dans la version imprimée et non pas sur l'écran. L'option d'impression de l'instruction est aussi prévue et vous pouvez en profiter en cliquant le lien ci-dessus - Imprimez l'instruction. Il n'est pas nécessaire d'imprimer toute l'instruction HP (Hewlett-Packard) STORAGEWORKS XP24000 - on peut choisir des pages. Economisez le papier.

Résumés

Vous trouverez ci-dessous les annonces des contenus qui se trouvent sur les pages suivantes de l'instruction de HP (Hewlett-Packard) STORAGEWORKS XP24000. Si vous voulez parcourir rapidement le contenu des pages suivantes de l'instruction, vous pouvez en profiter.

Résumés du contenu
Résumé du contenu de la page N° 1

HP StorageWorks
XP24000/XP20000 Volume Security User's
Guide
Abstract
This document describes and provides instructions for configuring and performing Volume Security operations
on the HP storage system.
Part number: T5214-96074
Sixth edition: June 2009

Résumé du contenu de la page N° 2

Legal and notice information © Copyright 2008-2009 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties

Résumé du contenu de la page N° 3

Contents 1 Overview of Volume Security ............................................................... 7 Overview ................................................................................................................................... 7 Terminology ............................................................................................................................... 7 2 About Volume Security Operations ....................................................... 9 Overview of Volum

Résumé du contenu de la page N° 4

Locating Ports through Which Hosts Can Access Volumes ........................................................ 45 Locating Security Groups that Contain a Specified Volume ....................................................... 45 Locating Hosts in a Security Group that Contains a Specified Volume ........................................ 46 Locating Security Groups that Contain a Specified Host Group ................................................. 46 Locating Security Groups that Contain a Spec

Résumé du contenu de la page N° 5

Figures 1 Security Example 1 ................................................................................................. 10 2 Security Example 2 ................................................................................................. 11 3 Security Example 3 ................................................................................................. 12 4 The Volume Security Window ................................................................................... 16 5 Security

Résumé du contenu de la page N° 6

Tables 1 Acronyms and Abbreviations .................................................................................... 73 6

Résumé du contenu de la page N° 7

1 Overview of Volume Security Unless otherwise specified, the term storage system in this guide refers to the following disk arrays: • HP StorageWorks XP24000 Disk Array • HP StorageWorks XP20000 Disk Array • HP StorageWorks XP12000 Disk Array • HP StorageWorks XP10000 Disk Array The GUI illustrations in this guide were created using a Windows computer with the Internet Explorer browser. Actual windows may differ depending on the operating system and browser used. GUI contents also vary with lic

Résumé du contenu de la page N° 8

referred to as S-VOLs, or source volumes. Secondary volumes are often referred to as T-VOLs, or target volumes. 8 Overview of Volume Security

Résumé du contenu de la page N° 9

2 About Volume Security Operations Overview of Volume Security Functions The Volume Security feature protects data in your storage system from I/O operations performed at mainframe hosts. Volume Security enables you to apply security to volumes so that the specified mainframe hosts will be unable to read from and write to the specified volumes. Volume Security also enables you to prevent data on volumes from being overwritten by erroneous copy operations. Volume Security can be used in conjuncti

Résumé du contenu de la page N° 10

• The volume ldev4 is accessible only from host4 because ldev4 and host4 are registered in the same access group. • The volume ldev5 does not belong to any access groups. For this reason, hosts in access groups cannot access ldev5. ldev5 is only accessible from host5 and host6, which are not registered in access groups. Figure 1 Security Example 1 Port-Level Security Usually, hosts are connected to two or more ports via cables and have access to volumes via these ports. In the security example i

Résumé du contenu de la page N° 11

Figure 2 Security Example 2 If no ports are registered in a host group, hosts in the host group can access volumes via ports to which the hosts are connected. This manual uses the term port-level security, which is a security policy for enabling hosts to access volumes only via ports registered in host groups and thus prohibiting hosts to access the volumes via other ports. CAUTION: Before you apply security, you should confirm what hosts are performing I/O operations on volumes in access groups

Résumé du contenu de la page N° 12

volumes (vol_A and vol_B) in a pool group, all the mainframe hosts connected to your storage system will be unable to access vol_A and vol_B. To register volumes in a pool group, you must create an LDEV group, register the volumes in the LDEV group, and then register the LDEV group in the desired pool group. Any pool group can only contain one LDEV group. In Figure 3, a pool group is created. Volumes in this pool group (that is, ldev7, ldev8, and ldev9) are inaccessible from all the hosts: Figur

Résumé du contenu de la page N° 13

When applying security, make sure that your security settings are correct. If incorrect security settings are made, the system will be difficult or impossible to control. If the CPU of a mainframe host is upgraded after you apply security settings, you must execute the system command D M=CPU at the mainframe host to obtain the latest information about the host. Next, you must use the latest information to update host information in the Add/Change Host dialog box (for details, see “The Add/Change

Résumé du contenu de la page N° 14

• 3390-9, 3390-9A, 3390-9B, 3390-9C • 3390-L, 3390-LA, 3390-LB, 3390-LC • 3390-M, 3390-MA, 3390-MB, 3390-MC • PCB types: Volume Security supports the following PCB types: • ESCON or ACONARC • FICON or FIBARC Maximum Possible Number of Groups Volume Security enables you to create up to 128 security groups per storage system, and up to 64 security groups per LDKC. Security groups are classified into access groups and pool groups: • One access group can contain only one host group and one LDEV grou

Résumé du contenu de la page N° 15

3 Using the Volume Security GUI This chapter explains Volume Security window and dialog boxes. The Volume Security Window The Volume Security window (Figure 4) appears when you start Volume Security. This window is the starting point for all the Volume Security operations. To start the Volume Security software: 1. Log on to the disk array to open the Remote Web Console main window. For details, see the HP StorageWorks XP24000/XP20000 Remote Web Console User’s Guide. 2. Click Go, Mainframe Connec

Résumé du contenu de la page N° 16

Figure 4 The Volume Security Window Item Description Displays the security, host, and LDEV groups assigned to each LDKC defined on the Security Group tree storage system. For details see “Security Group Tree ” on page 16. Displays the type, model, SEQNUMBER, Logical Partition (LPAR) and vendor of each Hosts table host. For details, see “Hosts Table” on page 18. Allows you to select the desired command unit(s) available in each group. When you CU list select a CU image, the table below shows a li

Résumé du contenu de la page N° 17

• Double-click Security Group and a list of security groups appears. Then select a host group or LDEV group in that security group. • Double-click Host Group and a list of host groups appears. Then select a specific host group. • Double-click LDEV Group. The tree view shows the host group and/or LDEV group registered in the security group. Figure 5 Security Group Tree Icon Description Indicates an access group whose volumes can be used as secondary volumes (i.e., copy destination volumes) for co

Résumé du contenu de la page N° 18

Icon Description Indicates that the security settings in this security group are currently disabled. If you enable the security settings, this security group is classified as an access group. Also, volumes in this security group can be used as secondary volumes (i.e., copy destination volumes) for copy operations. Indicates that the security settings in this security group are currently disabled. If you enable the security settings, this security group will be classified as an access group. Also

Résumé du contenu de la page N° 19

Figure 6 Hosts Table Column Description No. A sequential number associated with a host (or channel extender). Type/Model Type and model number of a host (or a channel extender). SEQNUMBER Node ID of a host (or a channel extender). LPAR The logical partition number of a host. The host vendor. Vendors include FJT (Fujitsu), IBM, HTC (Hitachi), and CNT(Ex). Vendor If CNT(Ex) appears, the table row indicates the type, model number, and node ID of a channel extender. If you make any change to a host,

Résumé du contenu de la page N° 20

Figure 7 LDEV table Column Description The volume ID (in hexadecimal from 00 to FF) NOTE: LDEV A volume ID ending in # (for example, 00#) indicates , the volume is an external volume. The emulation type of the volume Emulation The volume status: • An asterisk (*) denotes a secondary volume (copy destination) for USP V/VM Attribute copy software. • A plus symbol (+) denotes that one or more LU paths are assigned to the volume. The Add/Change Security Group Dialog Box The Add/Change Security Group


Instructions pareilles
# Instruction d'utilisation Catégorie Téléchargez
1 HP (Hewlett-Packard) 326431 Manuel d'utilisation Accessoires d'ordinateur 0
2 HP (Hewlett-Packard) DESKJET 710C Manuel d'utilisation Accessoires d'ordinateur 20
3 HP (Hewlett-Packard) Hewlett-Packard16047C Manuel d'utilisation Accessoires d'ordinateur 1
4 HP (Hewlett-Packard) Hewlett-PackardE200 Manuel d'utilisation Accessoires d'ordinateur 1
5 HP (Hewlett-Packard) Hewlett-PackardSwitch yl Module Manuel d'utilisation Accessoires d'ordinateur 0
6 HP (Hewlett-Packard) HP 16500C Manuel d'utilisation Accessoires d'ordinateur 11
7 HP (Hewlett-Packard) HP Microsoft Windows Server 2008 R2 Standard Edition 589256-B21 Manuel d'utilisation Accessoires d'ordinateur 5
8 HP (Hewlett-Packard) 4036 QDR Manuel d'utilisation Accessoires d'ordinateur 5
9 HP (Hewlett-Packard) Hewlett-Packard11689A Manuel d'utilisation Accessoires d'ordinateur 0
10 HP (Hewlett-Packard) Compaq Microtower Business PC DX2300 Manuel d'utilisation Accessoires d'ordinateur 9
11 HP (Hewlett-Packard) 5992-3838 Manuel d'utilisation Accessoires d'ordinateur 1
12 HP (Hewlett-Packard) Hewlett-Packard11864A Manuel d'utilisation Accessoires d'ordinateur 0
13 HP (Hewlett-Packard) Hewlett-Packard370971-004 Manuel d'utilisation Accessoires d'ordinateur 0
14 HP (Hewlett-Packard) HP Drive Enclosure AP844B Manuel d'utilisation Accessoires d'ordinateur 16
15 HP (Hewlett-Packard) Hewlett-Packard11688A Manuel d'utilisation Accessoires d'ordinateur 0
16 Sony VGC-RB50(G) Manuel d'utilisation Accessoires d'ordinateur 1
17 Sony Movie Studio HD Platinum Suite 11 MSPSMS11000 Manuel d'utilisation Accessoires d'ordinateur 177
18 Sony Hi-MD Walkman MCMD-R1 Manuel d'utilisation Accessoires d'ordinateur 7
19 Sony Sound Forge V.10.0 Pro SF-10000 Manuel d'utilisation Accessoires d'ordinateur 435
20 Sony Rechargable Battery Pack VGP-BPSC31 Manuel d'utilisation Accessoires d'ordinateur 23