Continuous Access Asynchronous, Continuous Access Synchronous, and Continuous Access Journal
volumes..........................................................................................................................138
Sidefile cache for Continuous Access Asynchronous.........................................................140
Continuous Access Asynchronous transition states and sidefile control................................141
Continuous Access Asynchronous/Continuous Access Journal error state.............................142
Continuous Access Synchronous/Continuous Access Asynchronous and Continuous Access Journal
fence level settings...........................................................................................................143
Setting the fence level..................................................................................................144
Snapshot operations.............................................................................................................144
Snapshot volumes............................................................................................................145
Creating a Fast Snap or Snapshot pair...............................................................................145
Snapshot pair status.........................................................................................................146
Pair status relationship to Snapshot commands.....................................................................146
Controlling Auto LUN............................................................................................................147
Specifications for Auto LUN...............................................................................................147
Commands to control Auto LUN.........................................................................................149
Relations between “cc” command issues and status..............................................................151
Restrictions for Auto LUN...................................................................................................153
Continuous Access Journal MxN configuration and control.........................................................153
Overview........................................................................................................................153
Policy ............................................................................................................................154
horcm.conf......................................................................................................................154
Command specifications...................................................................................................155
pairdisplay command..................................................................................................155
pairsplit command......................................................................................................156
Notice on system operation...............................................................................................158
Configuration examples....................................................................................................159
Remote volume discovery.......................................................................................................161
Discovering a remote volume.............................................................................................162
7 Data protection operations with RAID Manager..........................................164
Data protection operations.....................................................................................................164
Data Retention.................................................................................................................164
Restrictions on Data Retention volumes...........................................................................165
Database Validator..........................................................................................................165
Restrictions on Database Validator.................................................................................166
Protection parameters and operations......................................................................................167
Data Protection facility...........................................................................................................167
Data Protection Facility specifications..................................................................................168
Examples for configuration and protected volumes...............................................................168
Target commands for protection.........................................................................................169
permission command.......................................................................................................170
New options for security...................................................................................................170
raidscan –find inst.......................................................................................................170
raidscan –find verify [MU#]..........................................................................................170
raidscan –f[d].............................................................................................................171
pairdisplay –f[d].........................................................................................................171
Permitting protected volumes..............................................................................................171
With a $HORCMPERM file...........................................................................................171
Without a $HORCMPERM file: Commands to run on different operating systems.................172
Environment variables.......................................................................................................173
$HORCMPROMOD....................................................................................................173
$HORCMPERM..........................................................................................................173
Determining the protection mode command device...............................................................173
6 Contents
Comentarios a estos manuales