Claims
- 1. A storage system comprising:
a storage unit having storage regions for storing data; and a storage controller having a back end control unit for controlling the transfer of data from or to said storage unit, a cache for temporarily storing information read from said storage unit, a front end control unit for controlling the transfer of data between said cache and a host computer and a processor that acquires information for identifying said host computer from a frame sent from said host computer and that forces a memory to store said information.
- 2. A storage system comprising:
a storage unit having storage regions for storing data; and a storage controller having means for identifying storage regions of said storage unit, means for separating information for identifying a host computer from a frame included in a login request from said host computer, a monitor for displaying said connected host computer and said storage regions on the basis of said separated information, a panel for designating a storage region that can be accessed by said host computer with reference to said monitor, and means for setting access right of said host computer to said storage regions on the basis of designation entered through said panel.
- 3. A storage system according to claim 1, wherein said information for identifying said host computer is N_Port_Name or World Wide Name.
- 4. A storage system according to claim 1, wherein said information for identifying said host computer is Company_ID.
- 5. A storage system according to claim 4, wherein information of vendor corresponding to said Company_ID is previously stored.
- 6. A storage system according to claim 1, wherein information for identifying said host computer is any one of protocol, file type or OS of said host computer.
- 7. A storage system according to claim 1, wherein said storage controller is connected to said host computer through a network.
- 8. A storage system according to claim 1, wherein said storage controller is connected to said plurality of host computers having a different protocol and/or a different file system.
- 9. A storage controller comprising:
a back end control unit for controlling the transfer of data from or to a storage unit under command of said storage controller; a cache for temporarily storing information read from said storage unit; a front end control unit for controlling the transfer of data between said cache and a host computer; and a processor for acquiring information for identifying said host computer from a frame sent from said host computer and controlling a memory to store said information.
- 10. A storage controller comprising:
means for identifying storage regions under command of said storage controller; means for separating information for identifying a host computer from a frame included in a login request that said host computer issues; a monitor for displaying said connected host computer and said storage regions on the basis of said separated information; a panel for designating a storage region that can be accessed by said host computer with reference to said displayed information; and means for setting the access right of said host computer to said storage regions on the basis of designation entered through said panel.
- 11. In a storage system having a storage controller and a plurality of host computers connected via a network, a method of setting security for said storage system by said storage controller, comprising:
a step of receiving a frame including information for identifying said host computers; a step of separating said information from said frame and storing said information; a step of identifying storage regions under command of said storage controller; a step of generating a table of said host computers and said storage regions on the basis of said separated information; and a step of designating on said table a storage region that can be accessed by said host computers.
- 12. In a storage system having a storage controller and a plurality of host computers connected via a network, a method of setting security for said storage system by said storage controller, comprising:
a step of receiving a login request; a step of separating information for identifying said host computers from a frame included in said login request; a step of identifying storage regions under command of said storage controller; a step of displaying said connected host computers and said storage regions on the basis of said separated information; a step of designating a storage region that can be accessed by said host computers with reference to said displayed information; and a step of setting the access right of said host computers to said storage regions on the basis of the designation in said designating step.
- 13. A security setting method according to claim 12, wherein said information for identifying the host computers is any one of N_Port_Name, World Wide Name and Company_ID.
- 14. In a storage system having a storage controller and a plurality of host computers connected via a network, a method of setting security for said storage system by said storage controller, comprising:
a step of receiving PLOGI; a step of separating N_Port_Name or World Wide Name from a frame included in said PLOGI; a step of generating a table associated with said N_Port_Name or World Wide Name and S_ID included in said PLOGI; a step of deciding if said N_Port_Name or World Wide Name is previously stored; a step of identifying storage regions under command of said storage controller if said decision is that it is not previously stored; a step of displaying said connected host computers and said storage regions on the basis of said separated N_Port_Name or World Wide Name; a step of designating a storage region that can be accessed by said host computers with reference to said displayed information; a step of setting the access right of said host computers to said storage regions on the basis of the designation in said designating step; and a step of ordering said host computers to again send PLOGI.
- 15. A security setting method according to claim 11, wherein said designation for said accessible storage regions is performed for each of the accesses using separate read command and write command.
- 16. In a storage system having a storage controller and a plurality of host computers connected via a network, a method of setting security for said storage system by said storage controller, comprising:
a step of receiving a login request; a step of separating World Wide Name from a frame included in said login request; a step of further separating Company_ID from said World Wide Name; and a step of, when the access right of the same Company_ID to storage regions is already registered, making said access right be used as access right of said host computers that have sent said login request.
- 17. A security setting method according to claim 11, further comprising a step of transferring said access right to said host computers.
- 18. A security setting method according to claim 14, further comprising the steps of, when said host computer is added to said storage system, requesting N_Port_Name or Wold Wide Name to said added host computer in response to a notification (RSCN) that informs of state change of said storage system, adding information of said added host computer to said table and enabling the access right of said added host computer to be set on the basis of said N_Port_Name or World Wide Name from said added host computer.
- 19. A security setting method according to claim 14, wherein when one of said host computers is temporarily disconnected from said storage system, information of said disconnected host computer is not changed on said table.
Priority Claims (1)
Number |
Date |
Country |
Kind |
2000-157954 |
May 2000 |
JP |
|
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application is related to U.S. application Ser. No. 09/085,864, filed May 28, 1998, the contents of which are incorporated herein by reference.