Creating a Copy-on-Write Snapshot pair........................................................... 6-34
Copy-on-Write Snapshot pair status................................................................. 6-35
Pair status relationship to Copy-on-Write Snapshot commands...........................6-36
Controlling Volume Migration................................................................................. 6-37
Specifications for Volume Migration..................................................................6-37
Commands to control Volume Migration........................................................... 6-39
Relations between "cc" command issues and status.......................................... 6-42
Restrictions for Volume Migration.....................................................................6-43
Universal Replicator MxN configuration and control..................................................6-44
Overview........................................................................................................6-44
Policy ............................................................................................................6-44
horcm.conf.....................................................................................................6-45
Command specifications.................................................................................. 6-46
pairdisplay command.............................................................................6-46
pairsplit command................................................................................. 6-47
Notice on system operation............................................................................. 6-50
Configuration examples...................................................................................6-52
Duplication of CCI applications...............................................................................6-54
Requirements for duplication of CCI................................................................. 6-57
Note for duplication of CCI.............................................................................. 6-58
Remote volume discovery......................................................................................6-58
Discovering a remote volume...........................................................................6-59
7 Data protection operations with CCI.......................................................7-1
Data protection operations...................................................................................... 7-2
Data Retention Utility .......................................................................................7-2
Restrictions on Data Retention Utility volumes...........................................7-3
Database Validator .......................................................................................... 7-3
Restrictions on Database Validator............................................................7-4
Protection parameters and operations...................................................................... 7-5
Data Protection facility............................................................................................ 7-5
Data Protection Facility specifications................................................................. 7-7
Examples for configuration and protected volumes..............................................7-8
Operation authority with CMD security enabled...................................................7-9
Target commands for protection........................................................................7-9
permission command...................................................................................... 7-10
New options for security..................................................................................7-10
raidscan -find inst..................................................................................7-10
raidscan -find verify [MU#].................................................................... 7-11
raidscan -f[d]........................................................................................ 7-11
pairdisplay -f[d].....................................................................................7-12
Permitting protected volumes.......................................................................... 7-12
With a $HORCMPERM file.......................................................................7-12
Without a $HORCMPERM file: Commands to run on different operating
systems................................................................................................ 7-13
Environment variables.....................................................................................7-14
$HORCMPROMOD................................................................................. 7-14
$HORCMPERM.......................................................................................7-15
Determining the protection mode command device........................................... 7-15
viii
Command Control Interface User and Reference Guide