Method and apparatus for setting access restriction information
First Claim
1. A first storage device coupled to a computer and a second storage device, comprising:
- a first port coupled to the computer and being operated as a target port;
a second port coupled to the second storage device and being operated as an initiator port;
a processor coupled to the first port and the second port; and
a volume management information which is set based on port management information by the processor,wherein a first volume controlled by the first storage device is assigned to the first port,wherein a second volume is included in the second storage device so that the second volume is virtualized as the first volume by the first storage device,wherein the port management information is related to an access restriction of the second storage device,wherein the volume management information includes a volume identifier, an initiator port identifier and an external port identifier, andwherein upon receiving a write request to the first volume, if access to the first volume is permitted based on the volume management information, data of the write request is outputted to the second volume.
0 Assignments
0 Petitions
Accused Products
Abstract
Access restriction information that an old storage device has is transferred to a new storage device. A management server 2200 obtains a port management TL 2445 that the old storage device 2400 has, through a LAN 2600 which is separated from a Fiber Channel network which is utilized for data communication. Also, through the LAN 2600, a port list TL 2555 is obtained from the new storage device 2500. And, then, on the basis of the port list TL 2555, a port of the new storage device 2500, which is utilized for an access to a volume of the old storage device, is selected. And, on the basis of the port management TL 2445, on a port of the selected new storage device 2500, it is set up that access restriction information of a port of the old storage device 2400 to which a volume, of which the port is utilized for an access, is assigned.
127 Citations
16 Claims
-
1. A first storage device coupled to a computer and a second storage device, comprising:
-
a first port coupled to the computer and being operated as a target port; a second port coupled to the second storage device and being operated as an initiator port; a processor coupled to the first port and the second port; and a volume management information which is set based on port management information by the processor, wherein a first volume controlled by the first storage device is assigned to the first port, wherein a second volume is included in the second storage device so that the second volume is virtualized as the first volume by the first storage device, wherein the port management information is related to an access restriction of the second storage device, wherein the volume management information includes a volume identifier, an initiator port identifier and an external port identifier, and wherein upon receiving a write request to the first volume, if access to the first volume is permitted based on the volume management information, data of the write request is outputted to the second volume. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A first storage device coupled to a computer and a second storage device comprising:
-
a first port coupled to the computer and being operated as a target port; a second port coupled to the second storage device and being operated as an initiator port; a processor coupled to the first port and the second port; and a volume management information which is set based on port management information by the processor, wherein a first volume controlled by the first storage device is related to the first port, and wherein a second volume is included in the second storage device so that the first storage device provides the first volume as a virtualized volume of the second volume for the computer, wherein the port management information is related to an access restriction of the second storage device, wherein the volume management information includes a volume identifier, an initiator port identifier and an external port identifier, and wherein the first port controls a first access request for the first volume from the computer based on the volume management information. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system coupled to host computers comprising:
-
a first storage device comprising first volumes, first ports and a first memory storing volume management information; a second storage device, coupled to the first storage device, comprising second ports and a second memory storing port management information; and a management computer coupled to the first storage device and to the second storage device; wherein the port management information is related to an access restriction of the second storage device, wherein the volume management information includes a volume identifier, an initiator port identifier and an external port identifier, and wherein the management computer selects a first port A of the first ports as a target port which is used to receive an access request from the host computers and selects a first port B of the first ports as an initiator port which is used to send an access request to the second ports; wherein the management computer controls to change the volume management information so as to indicate that an access request from the host computer to the second volume via the first port B is permitted and an access request from another device to the second volume via the first port B is not permitted; wherein the management computer controls to set the port management information so as to indicate that an access request from the host computer to the second volume via a second port of said second ports is permitted and an access request from the another device to the second volume via the second port is not permitted. - View Dependent Claims (14, 15, 16)
-
Specification