Rm protection, Rm protection 80 – HP XP Continuous Access Software User Manual

Page 79

Advertising
background image

Using RAID Manager

79

RM protection

The RAID Manager protection facility restricts RM volume control
operations to volumes that:

• the host is allowed to see, with or without host-based LUN security

(Secure LUN XP)

• are listed in the RM configuration file.

To avoid inconsistency, RM security cannot be controlled within RM itself.

RM security is determined by command device definition within the SVP,
Remote Console, or via SNMP. Upon definition, the protection facility for
each command device can be enabled by setting an attribute. RM refers to
this attribute when it first recognizes the command device.

Command devices with protection ON permit access to volumes that are
not only on their list of allowed volumes, but are also host viewable.

The following figure shows the definition of a protected (access refused)
volume:

Permitted volumes

Volumes within Host view via
LUN Security

Volumes in the horcm.conf file viewable via
protection ON command device

Protected (refused) volumes

HOST1

HOST2

Advertising
This manual is related to the following products: