Computer system for allocating storage area to computer based on security level
First Claim
Patent Images
1. A computer system, comprising:
- a first computer;
a plurality of storage systems coupled to the first computer over a network; and
a second computer coupled to the first computer and the plurality of storage systems,wherein the first computer sends a request to the second computer,wherein the second computer has information about security level of the plurality of storage systems, selects, in response to the request from the first computer, one of the plurality of storage system according to the information in the second computer, and transmits a command to the selected one of the plurality of storage systems for creating a logical volume which is constructed on a physical disk device of the one of the plurality of storage systems for use by the first computer based on the request of the first computer,wherein the one of the plurality of storage systems creates the logical volume in accordance with the command, and forwards a creation completion notice to the second computer, andwherein after receiving the notice, the second computer notifies the first computer of path information of an access path from the first computer to the logical volume in the one of the Plurality of storage systems created by the one of the plurality of storage systems.
3 Assignments
0 Petitions
Accused Products
Abstract
A management server takes charge of managing information about whether a physical port is provided with means for security protection. Based on such information, the management server automatically determines to which physical port a volume is to be assigned. As such, an assignment process is executed.
-
Citations
16 Claims
-
1. A computer system, comprising:
-
a first computer; a plurality of storage systems coupled to the first computer over a network; and a second computer coupled to the first computer and the plurality of storage systems, wherein the first computer sends a request to the second computer, wherein the second computer has information about security level of the plurality of storage systems, selects, in response to the request from the first computer, one of the plurality of storage system according to the information in the second computer, and transmits a command to the selected one of the plurality of storage systems for creating a logical volume which is constructed on a physical disk device of the one of the plurality of storage systems for use by the first computer based on the request of the first computer, wherein the one of the plurality of storage systems creates the logical volume in accordance with the command, and forwards a creation completion notice to the second computer, and wherein after receiving the notice, the second computer notifies the first computer of path information of an access path from the first computer to the logical volume in the one of the Plurality of storage systems created by the one of the plurality of storage systems. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A management computer coupled to a computer and a plurality of storage systems, comprising:
-
a control section; a memory; and an interface to be coupled to a network and being coupled with the computer and the plurality of storage systems, wherein the memory includes information indicating whether or not an interface device, which each of the plurality of storage systems has to be coupled to the network is capable of ciphered communication by using an IPSec process, wherein when the computer makes a request to create a logical volume constructed on a physical disk device in one of the plurality of storage systems over the interface, the control section selects a first storage system which has a first interface device which can execute the ciphered communication by using the IPSec, and transmits, to the first storage system, a command for creating the logical volume and interrelating to the first interface device capable of the ciphered communication by using the IPSec process based on the request, and wherein after receiving a completion notice from the first storage system, the management computer notifies the computer of address information assigned to the first interface device capable of the ciphered communication by using the IPSec process.
-
-
16. A computer system, comprising:
-
a first computer; a storage system to be coupled with the first computer over a network; and a second computer to be coupled to the first computer and the storage system, wherein the first computer sends a request for creating a logical volume constructed on a Physical disk in the storage system to the second computer, wherein the second computer has information about whether each of a plurality of interface devices in the storage system used for coupling with the network is capable of ciphered communication with the first computer by using an IPSec process, decides, in response to the request the storage system is in accordance with the information in the second computer, and transmits a command to the decided storage system for creating the logical volume and for interrelating the logical volume used by the first computer to one of the plurality of interface devices capable of the ciphered communication by using the IPSec process in the storage system, wherein the storage system creates the logical volume and interrelates the created logical volume to the one of the plurality of interface devices capable of the ciphered communication by using the IPSec process in accordance with the command, and forwards to the second computer a creation completion notice, wherein the second computer notifies the first computer of address information in the network assigned to one of the plurality of interface devices capable of the ciphered communication by using the IPSec process, wherein based on the address information, the first computer makes access to the logical volume in the storage system via the one of the plurality of interface devices capable of the ciphered communication by using the IPSec process.
-
Specification