Command device guarding.......................................................................2-3
Alternate command device function.......................................................... 2-5
Remote command device.........................................................................2-6
CCI and the SCSI command interface.................................................................2-7
Command competition.............................................................................2-8
Command flow........................................................................................2-8
Issuing commands for LDEVs within a LUSE device....................................2-9
CCI instance components on the host server.............................................................2-9
HORCM operational environment....................................................................... 2-9
CCI instance configurations............................................................................. 2-10
Host machines that can be paired.................................................................... 2-12
Configuration definition file..............................................................................2-13
Configuration definition file settings................................................................. 2-16
HORCM_MON........................................................................................2-17
HORCM_CMD (in-band method)............................................................. 2-17
HORCM_CMD (out-of-band method)....................................................... 2-21
HORCM_DEV.........................................................................................2-23
HORCM_INST........................................................................................2-25
HORCM_LDEV....................................................................................... 2-26
HORCM_LDEVG.....................................................................................2-27
HORCM_INSTP......................................................................................2-28
HORCM_ALLOW_INST........................................................................... 2-28
Correspondence of the configuration definition file for cascading volume and mirror
descriptors..................................................................................................... 2-28
Correspondence of configuration file and mirror descriptors......................2-29
Cascading connection and configuration files...........................................2-30
ShadowImage.......................................................................................2-31
Cascading connections for TrueCopy and ShadowImage.......................... 2-33
CCI software files..................................................................................................2-35
CCI files supplied with the software..................................................................2-36
CCI files for UNIX-based systems............................................................2-36
CCI files for Windows-based systems...................................................... 2-37
CCI files for OpenVMS-based systems..................................................... 2-39
CCI log and trace files........................................................................................... 2-40
CCI log files....................................................................................................2-40
CCI trace files.................................................................................................2-43
CCI trace control command............................................................................. 2-43
Command logging for audit............................................................................. 2-43
Logging other than raidcom command.................................................... 2-43
Logging raidcom command.................................................................... 2-46
User-created files..................................................................................................2-49
User environment variable..................................................................................... 2-49
3 CCI functions........................................................................................3-1
System configuration using CCI............................................................................... 3-2
In-band system configurations and out-of-band system configurations................. 3-2
System configuration for connecting to a CCI server connected by the in-band
method using the out-of-band method............................................................... 3-5
Connecting to CCI server already connected by In-Band method using Out-of-Band
method.................................................................................................................. 3-5
User authentication.................................................................................................3-8
Command operation authority and user authentication.............................................. 3-9
iv
Command Control Interface User and Reference Guide