1. Field of the Invention
The present invention relates to a computer system including a storage device capable of managing security information and in particular to technique for automatically reflecting modification of managed information caused by replacement of an error component of an upper node device or the like to the security information.
2. Description of the Related Art
Technique of security for access to a storage controller from an upper node device is disclosed, for example, in JP-A-10-333839 (corresponding to EP 0 881 560 A2) which provides a storage device having the security function to prevent an unauthorized access from an upper node device by setting port name information for uniquely identifying an upper node device in the storage controller, so as to be compared with port name information stored in a frame sent from the upper node device, thereby determining whether the access is allowed.
However, according to the technique disclosed in JP-A-10-333839, when an interface component of the upper node device is replaced with a new one and a port name before the replacement is changed to a different port name after the replacement, it becomes impossible to access the new port name after the replacement due to security information set in the storage controller. For this, it is necessary to correct the security setting on the storage device after the replacement. Since a fiber channel can connect an upper node device to a storage controller via fabric, the upper node device may be at a distance from the storage controller. Accordingly, replacement of an interface component of the upper node device should be enabled without depending on the setting of the storage controller.
Moreover, since the port name is used as an identifier of the upper node device, security setting depending on an upper node device has been impossible when the upper node device has a plurality of fiber channel ports.
It is therefore an object of the present invention to provide a computer system including an upper node device having a connection port, an information exchange device connected to the connection port and controlling packet transfer, and a storage controller connected to the information exchange device and sending/receiving a packet to/from the upper node device via the information exchange device.
The storage controller has a control table containing connection port identification information and connection port security information. The control table may be created for each of the upper node device or the control table may further contain identification information of the upper node device. The storage controller detects replacement of the connection port according to information obtained from the information exchange device. When a replacement of the connection port is detected, the connection port identification information in the control table is replaced by new connection port identification information after the replacement.
Thus, according to the present invention, the security information of the connection port before replacement can be retained in the security information of the connection port after the replacement.
Moreover, when a node name is contained as the security information, for an upper node device having a plurality of fiber channel ports, it is possible to set security depending on the upper node device.
Firstly, referring to
The storage controller 40 includes: a fiber channel controller 41 performing data transfer to/from the upper node devices 10 and 20 and the extended link service with the name server 31; a microprocessor 42 controlling the entire storage controller; a memory 43 saving a micro-program controlling operation of the controller and control data; a data controller 44 controlling data read and write from/to a cache; a cache 45 for temporarily buffering write data and read data from a disk drive; a device interface controller 46 controlling data transfer to/from the disk drive; and an input interface 47 for entering access security information.
A control table 38 for realizing the present invention is creased on the memory 43. The control table 38 contains fiber channel port configuration of the uppernode devices together with the security information. The control table 38 is used to determine whether an access to the upper node device is to be allowed and to detect replacement of the fiber channel port. Accordingly, the control table 38 is preferably saved in a non-volatile region.
The reference numeral 50 denotes a disk array under the control by the storage controller 40. The disk array 50 is a device for storing data of the upper node device and includes a plurality of disk drives arranged so as to have redundancy. The disk array 50 is logically divided into a plurality of domains LU as SCSI access unit of the upper node device. In the present embodiment, the disk array 50 shows an example when having two domains LU0 (51) and LU1 (52).
Referring to
The name server 31 manages devices connected to the fabric in fiber channel port basis and returns FS_RJT or FS_ACC in response to the link service request as shown in 68 in
GNN_FT uses an I/O format shown in 69 in
In case of SCSI, 08 h is specified to the FC-4 type.
Thus, in step 62, the storage controller 40 can fetch the port ID and the node name of the fiber channel port of the device supporting the SCSI. Next, in step 63, the storage controller 40 issues a link service request GPN_ID (Get Port Name by Port ID) to the name server 31. The GPN_ID has an I/O format shown in 70 in
In step 64, the storage controller 40 uses the information fetched in step 62 to identify the node name of the fiber channel port allowed for I/O by the user in step 61 and then in step, using the sequence of steps 65 and 66, the information fetched in step 62 is used to identify port names of all the fiber channel ports of the upper node device specified by that node name. In step 67, the storage controller 40 adds security information to the port name information fetched in step 66 so as to constitute the fiber channel port configuration information of the upper node device, thereby creating a control table 48. In step 67, an example is given for a case when an access is allowed only to the fiber channel port 11 among the fiber channel ports of
Next, an example will be given on a data transfer by the upper node device 10 via the storage controller 40 with the disk array 50 where I/O security is applied using the control table 48.
The SCSI command in the data frame received by the fiber channel controller 41 is fetched and analyzed by the micro processor 42, and a data read request is issued via the device interface controller 46 to the disk array 50. When the data is stored in the cache 45 via the data interface controller 46 and the data controller 44, the micro processor 42 reports a data transfer start to the upper node device 10 using a data frame FCP_XFER_RDY. Data transfer is performed using a data frame FCP_DATA and status transfer is performed using a data frame FCP_RSP, thereby completing access.
Here, when the security setting of 67 in
Next, explanation will be given on an automatic correction technique according to the present invention used when correction of the control table 48 is required due to replacement of a fiber channel port. In
Correction of the control table 48 is performed when the storage controller 40 has received RSCN (registered state change notification) extended link service issued from the fabric 30. When a connection state of each of the fiber channel ports of the devices connected to the fabric 30 is changed, the RSCN is reported with the port ID of the fiber channel port to the respective devices. A plurality of port ID's may also be used.
Next, the when fiber channel port 13 is loaded on the upper node device 10 and connected to the fabric 30, the RSCN is issued from the fabric 30 and accordingly, the storage controller 40 again performs the process sequence of
Returning to
In the sequence of
Moreover, when no fiber channel port having the minus direction difference is present (in sequence 90 of
Here, if the upper node device should be stopped when adding a fiber channel port, after the fiber channel port is added, upon start of the upper node device, the start order of the fiber channel ports may not be determined and the fiber channel port to be added may be identified as the fiber channel port after the replacement. However, this can be eliminated by starting the upper node device without connecting the fiber channel port to be added, to the fabric, or by applying a history method to the port name correction in step 89 of
Further, it is possible to provide a storage controller enabling finer security management by assuming storage domains correlating each of resources such as a plurality of LUs managed by the storage controller and a plurality of fiber channel controllers and by having a control table for each of the storage areas.
Furthermore, by accepting a node name as the security information input and allowing all the data I/O received from this node name, the upper node device having a plenty of fiber channel ports can reduce the steps required for checking and setting the respective fiber channel ports identifiers.
Accordingly, when a node name is contained in the security information, it is possible to perform security setting depending on an upper node device when the upper node device has a plurality of fiber channel ports.
As has been described above, the storage controller 40 receives a port name input of a fiber channel port of an upper node device and has the port name list of the fiber channel ports of the upper node device for each of the node names of the upper node device and the control table containing the I/O enabling/disabling information, so that a node name which can be fetched from the fabric is compared to the port name list, thereby detecting a fiber channel port replacement of the upper node device. In the control table, the port name of the fiber channel port replaced is rewritten by the port name of the fiber channel port after the replacement. Thus, the upper node device can perform data I/O for the storage controller in the same way as before the fiber channel port replacement.
According to the present invention, for a storage controller connected to a fabric and supplied with a fiber channel port identifier as security information, when a fiber channel port of the upper node device is replaced, data I/O can be performed in the same way as before a fiber channel port replacement without consciously modifying the security information.
Number | Date | Country | Kind |
---|---|---|---|
2001-110785 | Apr 2001 | JP | national |
Number | Name | Date | Kind |
---|---|---|---|
5493650 | Reinke et al. | Feb 1996 | A |
5625621 | Christensen et al. | Apr 1997 | A |
5737319 | Croslin et al. | Apr 1998 | A |
5796736 | Suzuki | Aug 1998 | A |
5805800 | Kotani et al. | Sep 1998 | A |
6012100 | Frailong et al. | Jan 2000 | A |
6301612 | Selitrennikoff et al. | Oct 2001 | B1 |
6557033 | Maeda | Apr 2003 | B1 |
6681248 | Sears et al. | Jan 2004 | B1 |
6845395 | Blumenau et al. | Jan 2005 | B1 |
20050050191 | Hubis | Mar 2005 | A1 |
Number | Date | Country |
---|---|---|
0881560 | Dec 1998 | EP |
10-333839 | Dec 1998 | JP |
Number | Date | Country | |
---|---|---|---|
20020147802 A1 | Oct 2002 | US |