EasyManuals Logo

Hitachi VSP G400 User Manual

Hitachi VSP G400
530 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #8 background imageLoading...
Page #8 background image
Creating a Copy-on-Write Snapshot pair........................................................... 6-34
Copy-on-Write Snapshot pair status................................................................. 6-35
Pair status relationship to Copy-on-Write Snapshot commands...........................6-36
Controlling Volume Migration................................................................................. 6-37
Specifications for Volume Migration..................................................................6-37
Commands to control Volume Migration........................................................... 6-39
Relations between "cc" command issues and status.......................................... 6-42
Restrictions for Volume Migration.....................................................................6-43
Universal Replicator MxN configuration and control..................................................6-44
Overview........................................................................................................6-44
Policy ............................................................................................................6-44
horcm.conf.....................................................................................................6-45
Command specifications.................................................................................. 6-46
pairdisplay command.............................................................................6-46
pairsplit command................................................................................. 6-47
Notice on system operation............................................................................. 6-50
Configuration examples...................................................................................6-52
Duplication of CCI applications...............................................................................6-54
Requirements for duplication of CCI................................................................. 6-57
Note for duplication of CCI.............................................................................. 6-58
Remote volume discovery......................................................................................6-58
Discovering a remote volume...........................................................................6-59
7 Data protection operations with CCI.......................................................7-1
Data protection operations...................................................................................... 7-2
Data Retention Utility .......................................................................................7-2
Restrictions on Data Retention Utility volumes...........................................7-3
Database Validator .......................................................................................... 7-3
Restrictions on Database Validator............................................................7-4
Protection parameters and operations...................................................................... 7-5
Data Protection facility............................................................................................ 7-5
Data Protection Facility specifications................................................................. 7-7
Examples for configuration and protected volumes..............................................7-8
Operation authority with CMD security enabled...................................................7-9
Target commands for protection........................................................................7-9
permission command...................................................................................... 7-10
New options for security..................................................................................7-10
raidscan -find inst..................................................................................7-10
raidscan -find verify [MU#].................................................................... 7-11
raidscan -f[d]........................................................................................ 7-11
pairdisplay -f[d].....................................................................................7-12
Permitting protected volumes.......................................................................... 7-12
With a $HORCMPERM file.......................................................................7-12
Without a $HORCMPERM file: Commands to run on different operating
systems................................................................................................ 7-13
Environment variables.....................................................................................7-14
$HORCMPROMOD................................................................................. 7-14
$HORCMPERM.......................................................................................7-15
Determining the protection mode command device........................................... 7-15
viii
Command Control Interface User and Reference Guide

Table of Contents

Other manuals for Hitachi VSP G400

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Hitachi VSP G400 and is the answer not in the manual?

Hitachi VSP G400 Specifications

General IconGeneral
BrandHitachi
ModelVSP G400
CategoryStorage
LanguageEnglish

Related product manuals