HP XP7 Business Continuity Manager User Guide (TK954-96005)
Creating an inter-control unit logical path dedicated to the command device ..........................138
Supporting a Continuous Access Synchronous Z or TrueCopy Asynchronous for Mainframe
copy group configuration.............................................................................................138
Supporting a Continuous Access Journal Z copy group configuration.................................139
Configuration definition for using the Continuous Access Synchronous Consistency Preservation
function...............................................................................................................................139
Environment definition for using the Reverse Resync function.......................................................140
When the Reverse Resync function is used from the primary site and one or more other sites......140
When the Reverse Resync function is used only from the primary site.......................................141
Configuring an environment so that Non Gen'ed volumes can be used........................................142
Preparing the hardware (NG Scan)....................................................................................142
Preparing the configuration files.........................................................................................142
5 Configuration definitions.........................................................................144
Defining a 2DC configuration................................................................................................144
A 2DC configuration example...........................................................................................144
Preparing the hardware (2DC configuration).......................................................................144
Preparing the configuration files (2DC configuration)............................................................145
Preparing the configuration files (2DC configuration)............................................................146
Flow of configuration definitions (2DC configuration)............................................................147
Secondary site with a host............................................................................................147
Secondary site without a host.......................................................................................148
Definition procedure (2DC configuration)............................................................................149
Defining a 3DC Cascade (Cnt Ac-S Z x Cnt Ac-J Z) configuration................................................153
A 3DC Cascade (Cnt Ac-S Z x Cnt Ac-J Z) configuration example...........................................154
Preparing the hardware (3DC Cascade (Cnt Ac-S Z x Cnt Ac-J Z) configuration).......................154
Preparing the Configuration Files (3DC Cascade (Cnt Ac-S Z x Cnt Ac-J Z) Configuration)..........155
Definition procedure (3DC Cascade (Cnt Ac-S Z x Cnt Ac-J Z) configuration)............................157
Steps on the primary host (3DC Cascade (Cnt Ac-S Z x Cnt Ac-J Z) configuration)................158
Steps on the secondary host (3DC Cascade configuration)...............................................161
Defining a 3DC Cascade (Cnt Ac-J Z x Cnt Ac-J Z) configuration.................................................166
Configuration example (3DC Cascade (Cnt Ac-J Z x Cnt Ac-J Z) configuration).........................166
Preparing hardware (3DC Cascade (Cnt Ac-J Z x Cnt Ac-J Z) configuration).............................167
Preparing the configuration files (3DC Cascade (Cnt Ac-J Z x Cnt Ac-J Z) configuration)............167
Definition procedure (3DC Cascade (Cnt Ac-J Z x Cnt Ac-J Z) configuration)............................170
Performing a scan.......................................................................................................170
Steps at the primary site...............................................................................................171
Steps at the intermediate site........................................................................................173
Steps at the remote site................................................................................................174
Creating copy groups..................................................................................................175
Defining a 3DC Multi-Target (Cnt Ac-S Z x Cnt Ac-J Z) configuration............................................176
A 3DC Multi-Target (Cnt Ac-S Z x Cnt Ac-J Z) configuration example.......................................176
Preparing the hardware (3DC Multi-Target (Cnt Ac-S Z x Cnt Ac-J Z) configuration)...................177
Preparing the Configuration Files (3DC Multi-Target (Cnt Ac-S Z x Cnt Ac-J Z) Configuration)......177
Definition Procedure (3DC Multi-Target (Cnt Ac-S Z x Cnt Ac-J Z) Configuration).......................180
Performing a Scan (3DC Multi-Target Configuration)........................................................180
Settings for Operations at the Primary Site (3DC Multi-Target Configuration).......................181
Settings for Operations at the Local Site (3DC Multi-Target Configuration)...........................183
Settings for Operations at the Remote Site (3DC Multi-Target Configuration)........................185
Creating a Copy Group (3DC Multi-Target Configuration)................................................187
Defining a 3DC Multi-Target (Cnt Ac-J Z x Cnt Ac-J Z) configuration.............................................188
3DC Multi-Target (Cnt Ac-J Z x Cnt Ac-J Z) configuration example...........................................188
Preparing the hardware (3DC Multi-Target (Cnt Ac-J Z x Cnt Ac-J Z) configuration)....................189
Preparing the configuration files (3DC Multi-Target (Cnt Ac-J Z x Cnt Ac-J Z) configuration).........190
Definition procedure (3DC Multi-Target (Cnt Ac-J Z x Cnt Ac-J Z) configuration).........................193
6 Contents