Method and apparatus for setting access restriction information

ABSTRACT

Access restriction information that an old storage device has is transferred to a new storage device. A management server  2200  obtains a port management TL 2445 that the old storage device  2400  has, through a LAN 2600 which is separated from a Fibre Channel network which is utilized for data communication. Also, through the LAN 2600, a port list TL 2555 is obtained from the new storage device  2500.  And, then, on the basis of the port list TL 2555, a port of the new storage device  2500,  which is utilized for an access to a volume of the old storage device, is selected. And, on the basis of the port management TL 2445, on a port of the selected new storage device  2500,  it is set up that access restriction information of a port of the old storage device  2400  to which a volume, of which the port is utilized for an access, is assigned.

BACKGROUND OF THE INVENTION

This invention relates to a technology which sets up access restrictioninformation on a storage device.

Utilization of computer systems has been advanced in many fields such ascommerce and entertainment, and various data such as texts, sounds,still pictures, and motion pictures has been computerized. As a resultof that, there is a tendency that the amount of data which is stored ona storage device of a computer, represented by a disk array deviceincreases rapidly, and a storage device has been changed to one oflarge-scale. Also, in the field of highly public financial institutionsand electronic commerce etc., which depends upon computer systems, it isrequired not only to have high capacity and high performance but also tocontinue operation of a storage device for 24 hours, and for 365 days.In case of unavoidably stopping it because of a system maintenance workand so on, it is necessary to shorten down time as much as possible.

As an example of the system maintenance work, cited is a case ofintroducing a new storage device into a computer system. In case thatthe storage device (new storage device) to be introduced is connected toa host computer, and data on an existing storage device (old storagedevice) is relocated to the new storage device, since there is anecessity that a connection of the host computer and the old storagedevice is cut off once, and data is copied from the old storage systemis stopped. In order to copy massive data from the large-scale oldstorage device, there is a necessity to stop the system for a long time.

In pages 18 to 20, FIGS. 1 and 3 of Japanese Patent Publication No.H10-508967 of Japanese translation of PCT international patentapplication (hereinafter, referred to as Patent Document 1), disclosedis a method of shortening down time of a system at the time of datatransfer work, by carrying out a data transfer process during a periodof system operation. In this method, the host computer and the newstorage device are connected, and furthermore, the new storage deviceand the old storage device are connected. The new storage device copiesdata on the old storage device to its own storage area. The new storagedevice accepts an access request from the host computer to the data evenin the copy operation, and if data of a destination of the access existsin its own storage area, the data is accessed. In case that it does notexist in its own storage area, firstly, the data is copied from the oldstorage device, and then, it is accessed. In this operation with the newstorage device, it becomes possible to continuously operate the systemeven in a data transfer working state.

SUMMARY OF THE INVENTION

In the meantime, in a storage area network environment in which aplurality of host computers and storage devices are connected to oneanother via a network, in many cases, the storage device has a functionfor holding a list of host computers which are permitted to access thestorage device, and for carrying out a selective access restriction. Atechnology which is described in the above-mentioned Patent Document 1relates to data transfer from an old storage device to a new storagedevice, and does not consider an inheritance of the access restrictioninformation which is set up on the old storage device, to the newstorage device. For example, there is a case of changing from a systemconfiguration in which the host computer directly accesses the oldstorage device to a system configuration in which the host computeraccesses the old storage device through the new storage device. In thiscase, in order to continue the access to the old storage device evenafter the system change, there is a necessity to inherit the accessrestriction information which is set up on the old storage device to thenew storage device.

This invention has been developed in view of the above-describedsituation, and an object of this invention is to provide a technologyfor transferring the access restriction information of the old storagedevice has to the new storage device.

In order to solve the above-described problem, this invention sets upaccess restriction information which is set up on each port of an oldstorage device, on each port of a new storage device which is utilizedfor an access to the volume that the old storage device has or had.

For example, in a storage area network system having a storage devicewhich determines right or wrong of an access request to a volume, inaccordance with access restriction information which is set up on a portwhich received the request, and a host computer which transmits anaccess request to the storage device through a first network, the accessrestriction information is set up on the storage device. Firstly,through a second network, obtained are access restriction informationand information of volumes which are set up on each port which a firststorage device has. Also, through the second network, from a secondstorage device, obtained is attribute information including a port typeand a status of utilization of each port that the second storage devicehas. And, then, on the basis of the obtained attribute information ofeach port that the second storage device has, selected is a port of thesecond storage device which is utilized for accesses to volumes whichthe first storage device has or had. And, on the basis of the obtainedaccess restriction information and the obtained information of volumesof each port that the first storage device has, on a port of theselected second storage device, set up is access restriction informationof a port of the first storage device to which a volume, of which theport of the selected second storage device is utilized for an access, isassigned.

According to this invention, on each port of a new storage device whichis utilized for an access to an old storage device, set up is accessrestriction information which is set up on a port of an old storagedevice which is a destination of an access. On this account, on the newstorage device, it becomes possible to inherit and carry out the accessrestriction that the old storage device has carried out.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A and 1B are a view for illustrating a storage area networkenvironment that each embodiment of this invention manages, FIG. 1A is aview showing the storage area network environment before system change,and FIG. 1B is a view showing the storage area network environment aftersystem change.

FIG. 2 is a schematic view of a storage area network management systemto which a first embodiment of this invention is applied.

FIG. 3 is a view for illustrating a configuration of a volume managementTL 2400 that an old storage device 2400 holds.

FIG. 4 is a view for illustrating a configuration of a port managementTL 2445 that the old storage device 2400 holds.

FIG. 5 is a view for illustrating a configuration of a port list TL 2555that a new storage device 2500 holds.

FIG. 6 is a view for illustrating a configuration of a volume managementTL 2545 that the new storage device 2500 holds.

FIG. 7 is a flow chart for illustrating a transfer process that amanagement server 2200 carries out, in case of changing a systemconfiguration in which host computers 2000, 2100 directly access the oldstorage device 2400, to a system configuration in which they access theold storage device 2400 through the new storage device 2500.

FIG. 8 is a view for illustrating a configuration of a connectioncorrespondence management TL 2575 that the new storage device 2500prepares.

FIG. 9 is a view for illustrating a configuration of a port managementTL 2550 that the new storage device 2500 holds.

FIG. 10 is a schematic view of the host computer 2000 which is used in asecond embodiment of this invention.

FIG. 11 is a view for illustrating a configuration of a devicemanagement TL 2030 that the host computers 2000, 2100 have.

FIG. 12 is a view for illustrating a configuration of a mount point TL2035 that the host computers 2000, 2100 have.

FIG. 13 is a view for illustrating a configuration of the portmanagement TL 2550 of the new storage device 2500.

FIG. 14 is a flow chart for illustrating a transfer process that amanagement server 2200 carries out, in case of changing a systemconfiguration in which host computers 2200, 2100 directly access the oldstorage device 2400, to a system configuration in which they access theold storage device 2400 through the new storage device 2500, in thesecond embodiment of this invention.

FIG. 15 is a view for illustrating a configuration of a configurationinformation TL 5000 that the management server 2200 prepares.

FIGS. 16A and 16B are a view for illustrating a correspondence TL thatthe management server 2200 prepares, FIGS. 16A and 16B showcorrespondence TLs which are prepared for ports having WWNs of “S1a”,“S1b” of the port management TL 2445, respectively.

FIG. 17 is a flow chart for illustrating a mount update process that thehost computers 2000, 2100 carry out, in the second embodiment of thisinvention.

FIG. 18 is a schematic view of a host computer 2000 which is used in athird embodiment of this invention.

FIG. 19 is a view for illustrating a configuration of an alternativepath management TL 2050 that host computers 2000, 2100 have.

FIG. 20 Is a flow chart for illustrating a transfer process that amanagement server 2200 carries out, in case of changing a systemconfiguration in which host computers 2200, 2100 directly access the oldstorage device 2400, to a system configuration in which they access theold storage device 2400 through the new storage device 2500.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Prior to explanation of each embodiment of this invention, an storagearea network environment that each embodiment of this invention manageswill be described. FIG. 1 is a view for illustrating a storage areanetwork environment that each embodiment of this invention manages, andFIG. 1A shows the storage area network environment before system change,and FIG. 1B shows the storage area network environment after systemchange.

As shown in FIG. 1A, in the storage area network environment beforesystem change, a host computer 100 and an old storage device 105 havinga storage area 120 are connected through a network 115. The hostcomputer 100 directly accesses the storage area 120 of the old storagedevice 105, by way of a path 140. Access restriction information 130 isset up on the old storage device 105, and the old storage device 105rejects an access to the storage area 120 from one other than the hostcomputer 100, in accordance with this access restriction information130.

As shown in FIG. 1B, in the storage area network environment aftersystem charge, the host computer 100, the old storage device 105 havingthe storage area 120, and a new storage device 110 having a storage area125 are connected through a network 115. The host computer 100 accessesthe storage area 120 of the old storage device 105, through the newstorage device 110, by way of a path 145. This means, a function thatthe new storage device 110 has is applicable to the storage area 120that the old storage device 105 has. Also, data which is stored in thestorage area 120 of the old storage device 105 may not be necessarilytransferred to the storage area 125 of the new storage device 110.

Now, in order to transfer the storage area network environment as shownin FIG. 1A to the storage area network environment as shown in FIG. 1B,in each embodiment of this invention, prepared is an access path fromthe new storage device 110 to the storage area 120 of the old storagedevice 105, and the new storage device 110 is set up so as to relay anaccess request from the host computer 100 to the old storage device 105.Also, the access restriction information 130 which is set up on the oldstorage device 105 is inherited to the access restriction information135 of the new storage device 110. The access restriction information130 of the old storage device 105 is updated so as to reject an accessto the storage area 120 from one other than the new storage device 110.In the following explanation, these processes are called as transferprocess collectively.

First Embodiment

A first embodiment of this invention will be described, taking a casethat a storage area network is built up on a Fibre Channel network as anexample.

(1) System Configuration

FIG. 2 is a schematic view of a storage area network management systemto which the first embodiment of this invention is applied.

As shown in the figure, the storage area network management system ofthis embodiment is configured in the manner that a management server2200, a Fibre Channel switch (FC SW) 2300 which configures the storagearea network, an old storage device 2400, a new storage device 2500, andhost computers 2000, 2100 are connected to one another through a LAN2600. On this account, a LAN interface (LAN I/F) for connecting to theLAN 2000 is disposed in the FC SW 2300, the management server 2200, theold storage device 2400, the new storage device 2500, and the hostcomputer 2000, 2100. Although the LAN I/F of the all SW 2300 is notshown in the figure, concretely speaking, the management server 2200 hasa LAN I/F 2210, the old storage device 2400 has a LAN I/F 2415, the newstorage device 2500 has a LAN I/F 2520, the host computer 2000 has a LANI/F 2015, and the host computer 2100 has a LAN I/F 2110, respectively.In addition, if there is at least one host computer, it is sufficient.

The old storage device 2400, the new storage device 2500, and the hostcomputers 2000, 2100 are connected to one another, through the FC SW2300. In short, in this embodiment, the storage area network is built upon the Fibre Channel network. On this account, a Fibre Channel interface(FC I/F) for connecting to the FC SW 2300 is disposed on the old storagedevice 2400, the new storage device 2500, and the host computers 2000,2100. Specifically, the old storage device 2400 has two FC SWs 2405,2410, the new storage device 2500 has three or more FC I/Fs 2505, 2510,. . . , 2515, the host computer 2000 has two FC I/Fs 2005, 2010, and thehost computer 2100 has one FC I/F 2015, respectively. In this regard,however, the number of the FC I/Fs which is equipped with each devicewhich configures the storage area network is not limited to what isshown in FIG. 2.

The FC I/F is used as a port of data transmission and reception, and hasa unique identifier WWN (World Wide Name) In the following explanation,the FC I/F is simply called port. In addition, in order to distinguish aport that the host computer has and a port that the storage device has,there may be a case that they are called host port, storage port,respectively.

The host computers 2000, 2100 communicate with the storage devices 2400,2500 by use of a communication protocol defined on a Fibre Channelprotocol which is adopted by a Fibre Channel network, e.g., a standardSCSI protocol. By this, data, which is stored on the storage devices2400, 2500, is read and written.

The old storage device 2400 is a storage device which is a transfersource of access restriction information. As shown in the figure, it hasthe LAN I/F 2415, the FC I/Fs 2405, 2410, a plurality of disk drives2455, . . . , 2460, a disk controller 2430, a CPU 2425, and a memory2420. The disk controller 2430 controls a data transfer process to atleast one disk volume which stores data. The disk volume is a logicalstorage area which is configured by at least one disk drive 2455, . . ., 2460, and has a unique identifier on its own storage device. In thefollowing explanation, the disk volume is simply called volume. A volumewhich is assigned to a port for transmitting data to and receiving datafrom the host computers 2000, 2100 has a LUN (Logical Unit Number) withrespect to each port assigned. The host computers 2000, 2100, in casethat they access a volume, identify the volume by designating a storageport and LUN. In the memory 2420, stored are a storage device controlprogram (PG) 2435, a volume management table (TL) 2440, a portmanagement table (TL) 2445, and a device ID 2450 which is letter stringor number by which a storage device can be identified uniquely.

On the volume management TL 2440, registered is management informationof a volume that the old storage device 2400 has. FIG. 3 is a view forillustrating a configuration of the volume management TL 2440 that anold storage device 2400 holds. As shown in the figure, on the volumemanagement TL 2440, with respect to each volume that the old storagedevice 2400 has, registered are a volume number 244005 which is asequential serial number which is given to a volume, and a volume ID244010 which is an identifier for uniquely identifying a volume on theold storage device 2400. In an example shown in FIG. 3, as volume ID,letter strings such as “Vol.1”, “Vol.2” are registered.

On the port management TL 2445, registered is management information ofa port that the old storage device 2400 has FIG. 4 is a view forillustrating a configuration of the port management TL 2445 that the oldstorage device 2400 has. As shown in the figure, on the port managementTL 2445, with respect to each combination of a port that the old storagedevice 2400 has and a LUN which is assigned to the port, registered areWWN 244505 of the port, LUN 244510 which is assigned to the port andvolume ID 244515, Yes (existing) or No (no-existing) of accessrestriction 244520 to a volume which is assigned to a port and a WWN244525 of a source port of an access which is permitted to access avolume in case that the Yes/No or access restriction 244520 is “Yes”.For example, in FIG. 4, for a volume whose volume ID is “Vol.1”, LUN “0”is assigned to a port having a WWN of “S1a”. And it accepts only anaccess from a port having a WWN of “H1a”, In this case, “H1a”, “H1b”,“H2”, “S1a”, “S1b” of FIG. 4 are WWNs of ports 2005, 2010, 2105, 2405,2110 shown in FIG. 2, respectively. In addition, a content ofregistration of this volume management TL 2445 shows one of the oldstorage device 2400 before system change (status of FIG. 1A).

The storage device control PG 2435 is a program which controls anoperation of the old storage device 2400. The CPU 2425 carries out, byexecuting the storage device control PG 2435 which is stored in thememory 2420, assignment of a port and LUN to each volume, input andoutput of data, communication with an external through the LAN I/F 2415,and access restriction on the basis of the port management TL 2445.Also, to a SCSI Inquiry command to each volume, device ID and volume IDare notified to a command transmission source.

The new storage device 2500 is a storage device which becomes a transferdestination of access restriction information, and has a function forrelaying access requests from the host computers 2000, 2100 to the oldstorage device 2400. In the same manner as on the old storage device2400, it has the LAN I/F 2520, a plurality of FC I/Fs 2505, 2510, . . ., 2515, a plurality of disk drives 2565, . . . , 2570, a disk controller2535, a CPU 2530, and a memory 2525. Also, in the memory 2525, storedare a storage device control PC 2540, a volume management TL 2545, aport management TL 2550, a port list TL 2555, and a device ID 2560.

On the port list TL 2555, registered is attribute information of a portthat the new storage device 2500 has. FIG. 5 is a view for illustratinga configuration of the port list TL 2555 that the new storage device2500 has. As shown in the figure, on the port list TL 2555, with respectto each port that the new storage device 2500 has, registered are a portWWN 255505, a port type 255510, and Yes/No of a target port pathdefinition 255515. In the port type 255510, registered is any one of a“target” or an “initiator”. A port of the “target” shows a port forreceiving an access request from another port to a volume. And, a portof the “initiator” shows a port for transmitting an access request toanother port. In Yes/No of the target port path definition 255515, incase that the port type 255510 is “target”, registered is whether avolume is assigned to the port or not. Yes/No of the target port pathdefinition 255515 being “Yes” shows that a volume assigned exists, and“No” shows that a volume assigned noes not exist.

On the volume management TL 2545, registered is management informationof a volume that the new storage device 2500 has. FIG. 6 is a view forillustrating a configuration of the volume management TL 2545 that thenew storage device 2500 has. As shown in the figure, on the volumemanagement TL 2545, with respect to each volume that the new storagedevice 2500 has, registered are a volume number 254505 which is asequential serial number which is given to a volume, a volume ID 254510which is an identifier for uniquely identifying a volume on the newstorage device 2500, a volume type 254513 which shows an existingposition of a storage area of a volume, an initiator port WWN 254520, anexternal port WWN 254525, and an external connection LUN 254530, anexternal device ID 254535, and an external volume ID 254540. In casethat the volume type 254515 is “internal”, it shows that a storage areaof a volume exists in the new storage device 2500, and in case that itis “external”, it shows that a storage area of a volume exists in theold storage device 2400. That is, an access request from the hostcomputers 2000, 2100 to a volume whose volume type 254515 is “external”is relayed to the old storage device 2400. In the initiator WWN 254520,the external port WWN 254525, the external connection LUN 254530, theexternal device ID 254535 and the external volume ID 254540, registeredis information in case that the volume type 254515 is “external”. Incase of a volume of “internal”, information is not registered. In theinitiator port WWN 254520, registered is a WWN of an initiator portwhich is used on the occasion of relaying an access request from thehost computers 2000, 2100 to the old storage device 2400. In theexternal port WWN 254525 and the external connection LUN 254530,registered are a WWN and a LUN of a port which is assigned on the oldstorage device 2400, to a volume on the old storage device 2400 which isa relay destination of an access request. On the external device ID254535, a device ID of the old storage device 2400 is registered. And inthe external volume ID 254540, registered is a volume ID of a volume onthe old storage device 2400 which is a relay destination of an accessrequest. In an example shown in FIG. 6, on the new storage device 2500,a volume with a volume number “N+1” has a volume ID “Vol.N+1′”, and avolume type is “external”, and therefore, an access request to thisvolume is relayed to a volume on the old storage device 2400. The accessrequest is relayed from an initiator port having a WWN of “S2e” to LUN“0” of a port having a WWN of “S1a”, and is also relayed from aninitiator port having a WWN of “S2f” to LUN “1” of a port having a WWNor “S1b”. A device ID of the old storage device 2400 is “Storage 1”, anda volume ID on the old storage device 2400 is “Vol.1”.

The port management TL 2550 registers management information of a portthat the new storage device 2500 has, and has the same configuration asthat of the port management TL 2445 as shown in FIG. 4 that the oldstorage device 2400 holds.

The storage device control PC 2540 is a program for controlling anoperation of the new storage device 2500. The CPU 2530 realizes the samefunction as that of the storage device control PG 2435 of the oldstorage device 2400, by executing the storage device control PG 2540which is stored in the memory 2525. In short, it carries out assignmentof a port and LUN to each volume, input and output of data,communication with an external through the LAN I/F 2520, and accessrestriction on the basis of the port management TL 2550. Also, to a SCSIInquiry command to each volume, device ID and volume ID are notified toa command transmission source. Furthermore, the CPU 2530 realizes thefollowing function by executing the storage device control PG 2540. Inshort, on the basis of the volume management TL 2545, it relays anaccess request from the host computers 2000, 2100 to the old storagedevice 2400. Also, it scans an external disk volume which is connectedto the initiator port. This scan process will be described in detail atlater time.

The Fibre Channel switch 2300 has a plurality of ports (FC I/Fs) (notshown) for connecting to each port of the host computers 2000, 2100, theold storage device 2400, and the new storage device 2500, and has acommunication function among these plurality of ports. Also, it has azoning function for limiting the communication to inside of a specificport group (zone). It is possible to set up the zone from the managementserver 2200 through the LAN 2600. In a configuration before start of thetransfer process (status shown in FIG. 1A), it is set up so as for theports 2005, 2010, 2105, 2405, 2410 to be able to communicate with oneanother, i.e., so as for the host computers 2000, 2100 and the oldstorage device 2400 to be able to communicate with one another.

The management server 2200, as shown in the figure, has a LAN I/F 2210,a CPU 2205, and a memory 2215. In the memory 2215, a transfer control PG2220 is stored. The transfer control PG 2220 is a program for carryingout a transfer process. The CPU 22205 executes the transfer control PC2220 to perform reception of instruction from a user and transmission ofinstruction to the host computer 2000, 2100, the old storage device2400, the new storage device and the FC SW 2300 via the LAN I/F 2210,thereby the transfer process is performed. In addition, as notparticularly shown in the figure, the management server 2200 has aninput/output device which becomes an interface that an administratoroperates the transfer control PG 2220. An operation of the transfercontrol PG 2220 will be described in detail at later time.

(2) Procedure of Transfer Process

In case of changing a system configuration in which the host computers2000, 2100 directly access the old storage device 2400, to a systemconfiguration in which they access the old storage device 2400 throughthe new storage device 2500, a transfer process that the managementserver 2200 carries out will be described.

FIG. 7 is a flow chart for illustrating a transfer process that themanagement server 2200 carries out, in case of changing a systemconfiguration in which the host computers 2200, 2100 directly access theold storage device 2400, to a system configuration in which they accessthe old storage device 2400 through the new storage device 2500. Thisflow is started with executing the transfer control PG 2220, inaccordance with an instruction that the CPU 2205 of the managementserver 2200 accepted from an administrator.

Firstly, the management server 2200 obtains the port management TL 2445from the old storage device 2400 (step S3000). Concretely speaking, theCPU 2205 of the management server 2200 transmits a port management TLrequest to the old storage device 2400 through the LAN I/F 2210. The CPU2425 of the old storage device 2400, when it receives the portmanagement TL request from the management server 2200 through the LANI/F 2415, reads out the port management TL 2445 from the memory 2420,and transmits it to the management server 2200 through the LAN I/F 2415.The CPU 2205 of the management server 2200, when it receives the portmanagement TL 2445 from the old storage device 2400 through the LAN I/F2210, stores this in the memory 2215.

Next, the management server 2200 obtains the port list TL 2555 from thenew storage device 2500 (step S3005). Concretely speaking, the CPU 2205of the management server 2200 transmits a port list TL request to thenew storage device 2500 through the LAN I/F 2210. The CPU 2530 of theold storage device 2500, when it receives the port list TL request fromthe management server 2200 through the LAN I/F 2520, reads out the portlist TL 2555 from the memory 2525, and transmits it to the managementserver 2200 through the LAN I/F 2520. The CPU 2205 of the managementserver 2200, when it receives the port list TL 2555 from the new storagedevice 2500 through the LAN I/F 2210, stores this in the memory 2215.

Next, in the management server 2200, the CPU 2205 compares the number ofthe ports whose management information is stored on the port managementTL 2445 of the old storage device 2400 which is stored in the memory2215 with the number of ports whose port type 255510 is “target”, thetype 255510 being registered on the port list TL 2555 of the new storagedevice 2500 which is stored in the memory 2215, and whose target portpath definition 255515 is “No” (step S3010). In a transfer process ofthis embodiment, on one port of the old storage device 2400, one targetport of the new storage device 2500 is used. This is because, if aplurality of ports of the old storage device 2400 are integrated intoone target port, there is a possibility that assignments of LUN to thetarget port overlap. Therefore, in case that the number of unused targetports of the new storage device 2500 is smaller than the number of portsof the old storage device 2400, a system configuration can not bechanged. If (No in the step S3010), the transfer process is terminated.If not (Yes in the step S33010), a zone configuration of the FC SW 2300is changed, so as to enable mutual communication between the two hostcomputers 2000, 2100 and the new storage device 2500, and between theinitiator port of the new storage device 2500 and the old storage device2400 (step S3015). Concretely speaking, the CPU 2205 of the managementserver 2200 transmits zone configuration information to the FC SW 2300through the LAN I/F 2210. The FC SW 2300 changes the zone configurationin accordance with the zone configuration information received from themanagement server 2200. In addition, in the structure that the FC SE isnot used, it may be designed in the manner that the management server2200 displays the zone configuration information for an administrator,and the administrator physically changes a cable connection inaccordance with the displayed zone configuration information.

Next, in the management server 2200, with regard to each port which isregistered on the port management TL 2445 of the old storage device2400, the CPU 2205 selects one of the initiator ports from the port listTL 2555 of the new storage device 2500, and assigns the port to the oldstorage device 2400 (step S3020). It may be also designed in the mannerthat, on each port of the old storage device 2400, the CPU 2205arbitrarily selects an initiator port of the new storage device 2500from the port list TL 2555, or the port management TL 2445 and the portlist TL 2555 are displayed for an administrator, and a designation of aninitiator port or the new storage device 2500 which is assigned to eachport of the old storage device 2400 may be accepted from theadministrator. In addition, to a plurality of ports of the old storagedevice 2400, the same initiator port of the new storage device 2400 maybe selected.

Next, in the management server 2200, with respect to each port of theold storage device 2400, the CPU 2205 transmits an instruction forchanging WWN to be registered in the access permission WWN 244525 of aport of the port management TL 2445 that the old storage device 2400holds WWN of an initiator port of the new storage device 2500 which isassigned to the port, on the old storage device 2400 through the LAN I/F2210. The CPU 2425 of the old storage device 2400, when it receivesthis, updates the port management TL 2445 which is stored in the memory2420, in accordance with the instruction (step S3025). On this occasion,if the access restriction 244520 of a record that WWN is registered inthe access permission WWN 244521 is set up to “No”, this is changed to“Yes”. In this regard, however, in case that, by a zoning function etc.of the FC SW 2300, a port which can communicate with a port of the oldstorage device 2400 is limited to an initiator port of the new storagedevice 2500, the access restriction 244520 may be maintained as “No”without any change.

For example, in case of accessing a port of the old storage device 2400having WWN of “S1a”, from an initiator port of the new storage device2500 having WWN of “S2e”, “S2c” is registered in the access permissionWWN 244525 of the record that “S1a” is recorded on the port WWN 244505of the port management TL 2445. WWNs of “H1a”, “H1b”, “H2”, which havealready been registered, are deleted.

Next, the CPU 2205 of the management server 2200 transmits a volumemanagement TL update request including designation of an initiator portof the new storage device 2500 which is selected in the step S3020, tothe new storage device 2500 through the LAN I/F 2210. The CPU 2530 ofthe new storage device 2500, when it receives the volume management TLupdate request from the management server 2200 through the LAN I/F 2520,scans a volume or the old storage device 2400 which is accessible fromthe initiator port, with respect to each initiator port of the newstorage device 2500 which is included in the request, and updates thevolume management TL 2545 on the basis of a scan result (step S3030)Specifically, the CPU 2530 of the new storage device 2500, with respectto each initiator port of the new storage device 2500, by use of afunction which is prepared in the Fibre Channel protocol adopted by theFibre Channel network, scans a port of the old storage device 2400 whichcan communicate with the initiator port through the FC SW 2300. If itscans the port, it throws a predetermined command to each LUN throughthis port, and confirms a response. By this confirmation, accessible LUNin identified. When a LUN can be identified, an inquiry command, whichis defined in the Fibre Channel protocol, is transmitted to this LUN,and a device ID and a volume ID are obtained. And, by use of its result,the connection correspondence TL 2575 as shown in FIG. 8 is prepared.

In FIG. 8, in an entry 4000, WWN of the initiator port of the newstorage device 2500 which is selected in the step S3020 is registered.In this example, in order to access each port of the old storage device2400 having WWNs of “S1a”, “S1b”, initiator ports of the new storagedevice 2500 having WWNs of “S2e”, “S2f” are registered. In an entry4005, registered is a port of the old storage device 2400 which isaccessible from an initiator port of the new storage device 2500 whichis registered in the corresponding entry 4000. In an entry 4010,registered is a LUN which exists on a port of the old storage device2400 which is registered in the corresponding entry 4005. And, inentries 4010, 4015, registered is a device ID, a volume ID which areobtained by having transmitted the Inquiry command to a LUN which isregistered in the corresponding entry 4010.

Next, the CPU 2530 of the new storage device 2500 assigns a volume ID,with respect to each of a volume in the old storage device 2400 that adevice ID is registered in the entry 4015 of the connectioncorrespondence TL 2575, so as to be able to treat it on the new storagedevice 2500. In addition, as a result of volume scan, there is a casethat the same volume with a plurality of paths are found. On theconnection correspondence TL 2575 shown in FIG. 8, volumes having thesame external device ID which is registered in the entry 4015 and thesame external volume ID which is registered in the entry 4020 aretreated as an identical volume also on the new storage device 2500, andtherefore, there is no necessity to assign different volume IDs. Forexample, in FIG. 8, a volume of LUN“0” which is accessible from aninitiator port having WWN of “S2e”, and which exists in an external porthaving WWN of “S1” has a device ID, a volume ID of “Storage 1”, “Vol.1”,respectively, and is identical to a volume of LUN“1” which is accessiblefrom an initiator port having WWN of “S2f”, and which exists in anexternal port having WWN of “S1b”.

Next, the CPU 2530 of the new storage device 2500 adds information of avolume to which a volume ID is assigned, to the volume management TL2545 which is registered on the memory 2525. For example, in FIG. 6, avolume having a volume ID of “Vol.2” on the old storage device 2400 hasa volume ID of “Vol.N+2′” on the new storage device 2500, and isaccessed from an initiator port having WWN of “S2e” as LUN“1” whichexists in a port having WWN of “S1a”.

Now, the CPU 2530 of the new storage device 2500, when update of thevolume management TL 2545 which is registered on the memory 2525 iscompleted, it transmits this updated volume management TL 2545 throughthe LAN I/F 2520. And, the CPU 2205 of the management server 2200obtains the volume management TL 2545 from the new storage device 2500through the LAN I/F 2210 and stores it in the memory 2215 (step S3035)

Next, the CPU 2205 of the management server 2200, with respect to eachport of the old storage device 2400 whose WWN is registered in the entry244505 of the port management TL 2445 of the old storage device 2400,which is obtained in the step S3000, selects port WWN 255505 of a targetport of the new storage device 2500 which Yes/No of the target port pathdefinition 255515 is set up to “No”, from the port list TL 2555 of thenew storage device 2500, which is obtained in the step 33005 (stepS3040) It may be also designed in the manner that the CPU 2205arbitrarily selects a target port of the target port path definition of“No” from the port list TL 2555 for each port of the old storage device2400, or the port management TL 2445 and the port list TL 2555 aredisplayed for an administrator, and designation of the target port pathdefinition of “No” of the new storage device 2500, which is assigned toeach port of the old storage device 2400, may be accepted from anadministrator.

Next, the CPU 2205 of the management server 2200, with respect to eachport of the old storage device 2400, which is registered on the portmanagement TL 2445 obtained in the step S3000, transmits an instructionfor copying the management information of the port in entries 244505 to244525 of a target port of the new storage device 2500, which isregistered on the port management TL 2550, and which corresponds to theport selected in the step S3040, to the new storage device 2500 throughthe LAN I/F 2210. On this occasion, a volume ID which is registered inthe entry 244515 is, on the volume management TL 2545 which is obtainedfrom the new storage device 2500 in the step S3035, changed to a volumeID of the new storage device 2500, which is registered in the entry254510 of the record that the volume ID is registered in the entry254540 as an external volume ID.

For example, on the port management TL 2445 shown in FIG. 4, withrespect to each port of the old storage device 2400 having WWNs of“S1a”, “S1b”, when a target port of the new storage device 2500 havingWWNs of “S2c” is selected, “S2d”, respectively in the step S3040, asshown in FIG. 9, a content of each record having WWNs of “S1a”, “S1b”,respectively, of the port management TL 2445 shown in FIG. 4 is copiedto each record having WWNs of “S2c”, “S2d”, respectively, of the portmanagement TL 2550 of the new storage device 2500. In this regard,however, it is learned that the volume ID “Vol.1” of the old storagedevice 2400 corresponds to “Vol.N+1” on the new storage device 2500, byreferring to correspondence of an external volume ID and a volume ID ofthe volume management TL 2545 obtained in the step S3035. On thisaccount, “Vol.N+1” is registered in the volume ID 244515 of the portmanagement TL 2550. Other volume IDs are changed in the same manner.

As above, information or an access path from the new storage device 2300to a volume that the old storage device 2400 has is registered on thevolume management TL 2545 of the new storage device 2500, and also,access restriction information to a volume that the port management TL2445 of the old storage device 2400 has is transferred to the portmanagement TL 2550 of the new storage device 2500.

The first embodiment of this invention has been described. As describedabove, according to this embodiment, it is possible to inherit accessrestriction information which is set up on the old storage device 2400to the new storage device 2500. As a result of that, it is possible tocarry out access restriction to a volume by utilizing an accessrestriction function of the new storage device 2500, even after a systemconfiguration has been changed in the manner that the new storage device2500 relays an access requests from the host computers 2000, 2100 asshown in FIG. 1B, from the configuration that the old storage device2400 shown in FIG. 1A receives them directly. In addition, in thisembodiment, in order to obtain a volume ID and a device ID, utilized isa response which corresponds to the Inquiry command, but another SCSIcommand such as Mode Sense etc. may be utilized.

Furthermore, in this embodiment, the storage area network is built up onthe Fibre Channel network which uses a switch, but devices may bedirectly connected without a switch.

Also, this invention is not dependent upon a media or a protocol of anetwork. In this embodiment, it is assumed that the storage area networkand the LAN 2600 are separated, and a high speed Fibre Channel networkand an inexpensive network for control communication are usedseparately, but two networks may be united, and a common media andprotocol may be used. In that case, it is possible to share a switch anda cable and cut down communication facilities.

Second Embodiment

Next, a second embodiment of this invention will be described. Thisembodiment carries out a mount update process in which, in theabove-described first embodiment, the host computers 2000, 2100 collectconfiguration information of the new storage device 2500, and updates acorresponding relation of a volume and a mount point of a file system inaccordance with a changed system configuration, in case that accessrestriction functions that the old storage device 2400 and the newstorage device 2500 provide are different from each other, and a formatconversion process which a format of access restriction information tobe inherited from the old storage device 2400 is converted in accordancewith the new storage device 2500.

(1) System Configuration

A system configuration of this embodiment is the same as that of thefirst embodiment shown in FIG. 2. In this regard, however, hostcomputers 2000, 2100 are different from those of the first embodiment.Also, it is different from the first embodiment on the point that accessrestriction of a storage port of the new storage device 2500 is set upwith a group unit of host ports (in the first embodiment, LUN is aunit).

(1 1) Host Computer

FIG. 10 is a schematic view of a host computer 2000 which is used in thesecond embodiment of this invention. In addition, in a host computer2100 which is used in the second embodiment of this invention, a FC I/F2105 and a LAN I/F 2110 are provided, in lieu of the FC I/FE 2005, 2010and the LAN I/F 2015. Other configuration is the same as that of thehost computer 2000.

As shown in the figure, in the host computers 2000, 2100 of thisembodiment, in a memory 2020, stored are an agent PG 2025, a devicemanagement TL 2030, and a mount point TL 2035.

On the device management TL 2030, registered is a corresponding relationof volumes that the storage device 2400, 2500 provide, to device filesthat operating systems on their own host computers 2000, 2100 assign tothe volumes. FIG. 11 is a view for illustrating a configuration of thedevice management TL 2030. As shown in the figure, on the eachcombination of a host port that the own host computers 2000, 2100 haveand a storage port which becomes a destination of an access of the hostport, a WWN 203005 of the host port, a WWN 203010 of the storage port, aLUN 203015 which is assigned to the storage port, and a device file203020 in which operating systems of the own host computers 2000, 2100assigned to volumes which are identified by the storage port and theLUN. The device file is an operating system which carries outabstraction of a device, in order to treat an access to a device as afile access. In an example shown in FIG. 11, to a volume which isaccessed from a host port having WWN of “H1a” as LUN“0” of a storageport having WWN of “S1a”, a device file of /dev/dsk/c0t0d0 is assigned.

On the mount point TL 2035, registered is a corresponding relation of adevice file of a volume, and a mount point in a file system which mountsthe volume. FIG. 12 is a view for illustrating a configuration of themount point TL 2035. As shown in the figure, on the mount point TL 2035,with respect to each volume that the own host computers 2000, 2100 areaccessible, registered are a device file 203505 of a volume, and a mountpoint 203510 on which the device file is mounted. In an example shown inFIG. 12, a volume to which a device file of “/dev/dsk/c0t0d0” isassigned is mounted on a mount point of “/usr/bin” in the file system.

The agent PG 2025 is a program for carrying out the above-describedmount update process and format conversion process. The CPU 2040 carriesout, by executing the agent PG 2025 which is stored in the memory 220,carries out communication with an external through the LAN I/Fs 2015,2110 (transfer control PG 2220 of the management server 2200), update ofthe device management TL 2030 and the mount point TL 2035, preparationof a device file, and mount control of a file system. Also, it scans avolume which is accessible from each host port of the own host computers2000, 2100, and collects information of each volume. In case that anoperating system manages a device file, the device management TL 2030,and the mount point TL 2035, the agent PG 2025 calls for a system call,a library routine, and a standard command that an operating systemprovides, according to need, and realizes these functions.

(1-2) Access Restriction of Host Port with Group Unit

In the above-described first embodiment, on the new storage device 2500,in the same manner as the old storage device 2400, access restrictioninformation is set up with a LUN unit with respect to each port (sec,the port management TLs 2445, 2550 shown in FIGS. 4 and 9). On the otherhand, on the new storage device 2500 of this embodiment, accessrestriction information is set up with a group unit of host ports withrespect to each port. FIG. 13 is a view for illustrating a configurationof the port management TL 2550 of the new storage device 2500. On theport management TL 2550 of the new storage device 2500 of the firstembodiment, as shown in FIG. 9, with respect to each of the port WWN244505, registered is the access restriction information (volume ID244515, Yes/No of access restriction 244520, access permission WWN244525) with the LUN 244510 unit. However, on the port management TL2550 of the new storage device 2500 of this embodiment, as shown in FIG.13, with respect to each of the port WWN 244505, registered is accessrestriction information (Yes/No of access restriction 244520, LUN244515, volume ID 244515) with the access permission WWN 244525 (a groupof host ports which permit accesses) unit. In short, correspondencebetween a LUN and a volume is independently assigned with respect toeach group of host ports. For example, in FIG. 13, to a port having WWNof “S2a”, volumes having volume IDs of “Vol.X” and “Vol.Y” are assigned,both as LUN“0”. In case that there is an access request from the hostcomputers 2000, 2100 to the LUN“0” of “S2a”, which volume is accessed isdetermined by a WWN of a source of the access. In FIG. 13, in case thatan access is requested from “Hx”, “Vol.X” is accessed, and in case thatthere is an access request from “Hy”, “Vol.Y” is accessed. In order todetermine a volume which corresponds to overlapping LUNs with a WWN of asource of an access, on one storage port, one host port can not belongto a plurality of groups.

In this manner, in access restriction with a group unit of host ports,flexible LUN assignment becomes possible. In this embodiment, themanagement server 2200 identifies which an access restriction functionof the LUN unit or the group unit of host ports is provided by thetransfer control PG 2220, on the basis of a device ID of each storagedevice 2400, 2500. Detailed particulars of a process in which thestorage devices 2400, 2500 realize access restriction with a group unitof host ports by the storage control PG 2435, 2540 will be omitted sincethey are beyond the scope of this invention.

(2) Transfer Process Procedure (Utilization or Agent PG and Conversionof Access Restriction Information)

A transfer process procedure that the management server 2200 carriesout, in case of changing a system configuration in which the hostcomputers 2000, 2100 directly access the old storage device 2400, to asystem configuration in which they access the old storage device 2400through the new storage device 2500, will be described.

FIG. 14 is a flow chart for illustrating a transfer process that themanagement server 2200 carries out, in case of changing a systemconfiguration in which the host computers 2000, 2100 directly access theold storage device 2400, to a system configuration in which they accessthe old storage device 2400 through the new storage device 2500, in thesecond embodiment of this invention. This flow is started with executingthe transfer control PG 2220, in accordance with the instruction thatthe CPU 2205 of the management server 2200 accepted from anadministrator.

Firstly, the management server 2200 obtains the device management TL2030 and the mount point TL 2035 from each of the host computers 2000,2100 (step S6000). Concretely speaking, the CPU 2205 of the managementserver 2200 transmits a device management TL request and a mount pointmanagement TL request to the host computers 2000, 2100 through the LANI/F 2210. In each of the host computers 2000, 2100, the CPU 2040, whenit receives the device management TL and mount point TL requests fromthe management server 2200 through the LAN I/Fs 2015, 2110, it scans avolume which is accessible from a host port of its own host computers2000, 2100, by the agent PG 2025, and transmits an Inquiry command tothe volume found, and inputs a device ID and a volume ID of the storagedevices 2400, 2500 having the volume. Also, it reads out the devicemanagement TL 2030, and the mount point TL 2035, from the memory 220.And it transmits a WWN, a LUN of a storage port to which the volume isassigned, and a device ID and a volume ID which are obtained as aresponse of the Inquiry command to the volume, the device management TL2030 and the mount point TL 2035 which are read out from the memory2020, to the management server 2200 through the LAN I/Fs 2015, 2110. TheCPU 2205 of the management server 2200, when it receives the WWN and LUNof the storage port, the device ID, the volume ID, the device managementTL 2030, and the mount point TL 2035, from each of the host computers2000, 2100 through the LAN I/F 2210, it prepares a configurationinformation TL 5000 as shown in FIG. 15 on the basis of these pieces ofinformation. In FIG. 15, in entries 500005, 500010, and 500015,registered are a WWN of a host port, a WWN and a LUN of a storage port,which are registered on the device management TL 2030. In the entries500015 and 500020, registered are a device ID and a volume ID which areobtained as a response of an inquiry command to a volume which isidentified by a WWN and a LUN of a storage port which is registered incorresponding entries 500010 and 500015. The CPU 2205 of the managementserver 2200 deletes a record having a device ID which is different fromthat of the old storage device 2400 which is a transfer target of accessrestriction information, and enables only information regarding the oldstorage device 2400 to be registered on the configuration information TL5000.

Next, the CPU 2205 of the management server 2200 sorts information ofthe entries 500005, 500010, 500015, and 500020 of the configurationinformation TL 5000 shown in FIG. 15, and generates the port managementTL 2445 of the old storage device 2400 (S6005). Yes/No of accessrestriction 244520 of the port management TL 2445 are all set up as“Yes”.

Next, the management server 2200 obtains the port list TL 2555 from thenew storage device 2500, in the same manner as in the step S3005 of FIG.7 (step S6010).

Next, the management server 2200 obtains the number of storage port WWNSwhich are registered in the entry 500010 of the configurationinformation TL 5000 shown in FIG. 15, in short, the number of ports ofthe old storage device 2400. And, in the same manner as in the stepS3010 of FIG. 7, it compares with the number of ports of a (unused)target ports which have no target port path definitions of the newstorage device 2500, and judges whether a configuration change of asystem is possible or not (step S6015). If the number of unused targetports of the new storage device 2500 is smaller than the number of portsof the old storage device 2400 (No in the step S6015), a transferprocess is terminated. If not (Yes in the step S6015), the configurationinformation TL 5000 shown in FIG. 15 is transmitted to each of the hostcomputers 2000, 2100, and unmount of a volume is instructed (stepS6020). The CPU 2040 of the host computers 2000, 2100 refers to thedevice management TL 2030 and the mount point TL 2035 which are storedin the memory 2020, with the agent PG 2025, and specifies a mount pointwhich corresponds to a volume indicated by a WWN of a host port, a WWNand a LUN of a storage port, which are registered on the configurationinformation TL 5000 which has been received by the management server2000, and unmounts an operating system a file system which has beenmounted.

Steps S6025 to S6050 are the same as the steps S3015 to S3040 shown inFIG. 7. In this regard, however, the step S6045 is different from thestep S3035, and also obtains a device ID of the new storage device 2500.

Next, tho CPU 2205 of tho management server 2200 judges whether anaccess restriction function of the new storage device 2500 is of a groupunit of host ports or not (step S6055), on the basis of a device IDwhich is obtained from the new storage device 2500 in S6045 and a typeof access restriction function which has been registered in advance, forexample, with respect to each device ID. In case that the new storagedevice 2500 is a storage device which carries out access restrictionwith LUN unit, the flow goes to a step S6065, and a process, which isthe same as in the step S3045 shown in FIG. 7, is carried out. On theother hand, in case that the new storage device 2500 carries out accessrestriction with a group unit of host ports, the flow goes to a stepS6060.

In the step S6060, the CPU 2205 of the management server 2200 convertsthe port management TL 2445 of the old storage device 2400, which isgenerated in the step S6005, into a table which is of the same format asthe port management TL 2550 of the new storage device 2500 shown in FIG.13. In order to do that, as shown in FIG. 16, with respect to eachstorage port or the old storage device 2400, a correspondence TL (table)of a LUN to a WWN of a host port which is permitted to access isprepared. FIGS. 16A and 16B show correspondence TLs which are preparedregarding ports having WWNs of “S1a”, “S1b”, of the port management TL2445, respectively. In FIG. 16A, in an entry 7000, registered is a LUNwhich is assigned to a storage port having a WWN of “S1a”. In entries7005, 7010, and 7010, registered is to which LUN each of host portshaving WWNs of “H1a”, “H1b”, “H2” is accessible. A circular mark showsthat it is possible to access a LUN, and a blank show that it is notpossible to access. These tables can be prepared from the portmanagement TL 2445 shown in FIG. 4, which is prepared in the step S6005.In short, in case of preparing a correspondence TL of a certain storageport, with respect to each LUN of the entry 244510 which corresponds tothe entry 244505 in which a WWN of the port is registered, the entry244525, which corresponds to the entry 244510, may be investigated, anda circular mark may be given to a host port whose WWN is registered inthe entry 244525. On the correspondence TL, in case that WWNs of aplurality of host ports to which circular marks are given correspondingto the same LUN, this plurality of host ports can be put into one group.For example, in FIG. 16A, a host port having a WWN of “H1b” and a hostport having a WWN of “H2” are put into one group. Also, in FIG. 16B, ahost port having a WWN of “H1a” and a host port having a WWN of “H2” areput into one group. When a host group is determined, it is possible toeasily convert the port management TL 2445 into a table of the same formas the port management TL 2550 of the new storage device 2500 shown inFIG. 13. In short, with regard to a certain storage port, a WWN of thestorage port is registered in an entry 255055, and with respect to eachgroup of host ports, an entry 255060 is provided, and a WWN or each hostport, which belongs to a group corresponding to each entry 255060, isregistered. Also, in entries 255065, 255070, and 255075 which aredisposed with respect to each entry 255060, registered are “Yes” ofYes/No of access restriction, a LUN which corresponds to a group of hostports which is registered in corresponding entry 255060, and a volume IDwhich is specified by a WWN and a LUN or a storage port which areregistered in corresponding entries 255055, 255070.

Next, the CPU 2205 of the management server 2200, by use of accessrestriction information which is configured with a unit of a group ofhost ports, updates the port management TL 2550 of the new storagedevice 2500 (step S6065). With respect to each target port of the newstorage device 2500 which is selected in the step S6050, information iscopied from the port management TL 2445 of the old storage device 2400whose format is converted. Also, in the same manner as in the step S3045shown in FIG. 7, a volume ID is changed to a volume ID used on the newstorage device 2500.

By the steps which have been described up to here, the transfer processof access restriction information is completed. However, in thisembodiment, information regarding mount of a file system on the hostcomputers 2000, 2100 is further updated. A volume whose access path(route) is changed by the transfer process can not be accessed by anexisting device file. The CPU 2205 (transfer control PG 2220) of themanagement server 2200 instructs the CPU 2040 (agent PG 2025) of thehost computers 2000, 2100 to recognize with a new path and to prepare adevice file (step S6070). In each of the host computers 2000, 2100, theCPU 2040, when it receives this, by the agent PG 2025, scans a volumewhich is accessible from a host port that itself has, by use of afunction that an operating system provides. Then, a device file of avolume which is not registered on the device management TL 2030, i.e.,the volume which has newly been found is prepared, and is added to thedevice management TL 2030.

Next, the CPU 2205 of the management server 2200 transmits the volumemanagement TL 2545 and a device ID which are obtained from the newstorage device 2500 in the step S6045, to the host computers 2000, 2100,and instructs the CPU 2040 (agent PG 2025) of each of the host computers2000, 2100, so as to change a device file which is registered on themount point TL 2035 to a device file which has newly been filed (S6075).The CPU 2040 of each of the host computers 2000, 2100, when it receivesthis, by the agent PG 2025, carries out a mount update process, to acombination of a WWN and a LUN of a storage port which is registered inmutually corresponding entries 500010, 500015 of the device managementTL 2030.

FIG. 17 is a flow chart for illustrating that mount update process thatthe host computers 2000, 2100 carry out, in the second embodiment ofthis invention.

In each of the host computers 2000, 2100, the CPU 2040 (agent PG 2025)selects one of records (a combination of WWN of a host port, WWN, LUN ofa storage port and a device file) from the device management TL 2030which is registered on the memory 2020, and issues an inquiry commandfrom a WWN of a host port of the selected record, and obtains a deviceID and a volume ID (step S10000). Next, the CPU 2040 compares theobtained device ID with a device ID (S6075 of FIG. 14) which is receivedfrom the management server 2200 (transfer control PG 2220) (S10005). Incase that both of them differ (No in S10005), if there is a record whichis not selected from the device management TL 2030 (No in S10045), theflow goes back to S10000 to continue a process. However, if both of themcoincide (Yes in S10045), the obtained volume ID is scanned from volumeIDs which are registered in the entry 254510 of the volume management TL2545 (S6075 of FIG. 14) which is received from the management server2200 (transfer control PC 2220) (step S10010).

Next, the CPU 2040 checks a volume type which is registered in the entry254515 which corresponds to the entry 254510 of the detected volume ID(S10015). If a volume typo is “internal” (No in S10015), if there is arecord which is not selected from the device management TL 2030 (No inS10045), the flow goes back to S10000 to continue a process. However, incase that a volume type is “external” (Yes in S10015), a combination ofa WWN, an external connection LUN of an external port which isregistered in entries 254525, 254530 which correspond to the entry 25410of the detected port ID, i.e., a WWN, a LUN of a storage port of the oldstorage device 2400, and a WWN of a host port which issued an Inquirycommand is compared with a combination of a WWN, a LUN of a storage portwhich is registered on the device management TL 2030, and a WWN of ahost port, and a combination to be matched is detected from the devicemanagement TL 2030. And, a device file, which corresponds to thedetected combination, is tried to be found (step S10020). If the devicefile is not found (No in S10025), if there is a record which is notselected from the device management TL 2030 (No in S10045), the flowgoes back to S10000 to continue a process.

In case that the corresponding device file is found from the devicemanagement TL 2030 (Yes in S10025), this device file is prepared in theconfiguration that a volume of the old storage device 2400 is recognizedfrom the host computers 2000, 2100 without passing through the newstorage device 2500 (configuration shown in FIG. 1A). This device filecan not be used in a system after configuration change (configurationshown in FIG. 1B). On this account, there is a necessity to substituteit with a new device file. In this connection, the CPU 2040 looks forthis device file, from the mount point TL 2035 (step S10030). In casethat this device file is not registered on the mount point TL 2035 (Noin S10035), since there is no mount point which corresponds to thisdevice file, there is no necessity to update the mount point TL 2035. Inthis case, if there is a record which is not selected from the devicemanagement TL 2030 (No in S10045), the flow goes back to S10000 tocontinue a process.

In case that the device file, which is found from the device managementTL 2030, is registered on the mount point TL 2035 (Yes in S10035), thisdevice file, which is registered on the mount point TL 2035, is updatedto a device file of a record, which is registered on the devicemanagement TL 2030, and which is selected in the step S10000 (stepS10040). The above-described process is repeated with respect to WWNs ofall host ports which are registered on the device management TL 2030(step S10045).

Finally, the CPU 2040 mounts a device in accordance with the updatedmount point TL 2035, by a function of an operating system which receivesan instruction from the agent PG 2025 (step S10050). With this process,a volume of the old storage device 2400 can be mounted on the same mountpoint so as to access through the new storage device 2500, also after asystem configuration has been changed.

As above, tho second embodiment of this invention has been described.According to this embodiment, in addition to the above-describedadvantage of the first embodiment, it has the following advantage. Thatis, even in case that the management server 2200 does not obtain theport management TL 2445 from the old storage device 2400, by utilizingthe agent PG 2025 on the host computers 2000, 2100, it is possible tocarry out tho transfer process. Also, even in case that an accessrestriction function of the old storage device 2400 and the new storagedevice 2500 are different from each other, it is possible to convertaccess restriction information of the old storage device 2400 into aformat which is suitable for the new storage device 2500 and then, totransfer the same. Furthermore, it is possible to maintaincorrespondence of a volume to a mount point of the old storage device2400, even after system configuration change.

In addition, in this embodiment, in order to maintain correspondence ofa volume to a mount point, information of an old device file is updatedto information of a new device file. However, the same process isapplicable to management other than mount point, e.g., device managementof Logical Volume Manager which realizes visualization of a volume.

Third Embodiment

Next, a third embodiment of this invention will be described. In thisembodiment, by utilizing an alternative path which is set up between thehost computers 2000, 2100 and the old storage device 2400, withoutstopping operations of the host computers 2000, 2100, the transferprocess is carried out. The alternative path is a mechanism in which aplurality of paths, which access a certain volume from a host computer,are provided, and an access is continued by use of another path in casethat there occurs a trouble in one path. In order to avoid the statethat all paths become unavailable due to a trouble of one port, eachpath, which are different from each other.

(1) System Configuration

A system configuration of this embodiment is the same as in the firstembodiment shown in FIG. 2. In this regard, however, host computers2000, 2100 are different from those in the first embodiment.

(1 1) Host Computer

FIG. 18 is a schematic view of a host computer 2000 which is used in thethird embodiment of this invention. In addition, in a host computer 2100which is used in the third embodiment of this invention, a FC I/F 2105and a LAN I/F 2110 are provided, in lieu of the FC I/Fs 2005, 2010 andthe LAN I/F 2015. Other configuration is the same as that of the hostcomputer 2000.

As shown in the figure, in the host computers 2000, 2100 of thisembodiment, in a memory 2020, an agent PG 2025, an alternative pathcontrol PG 2045, and an alternative path management TL 2050 are stored.

On the alternative path management TL 2050, a correspond relation of apath to each volume that the storage device 2400, 2500 provide and itsalternative path are registered. FIG. 19 is a view for illustrating aconfiguration of the alternative path management TL 2050. As shown inthe figure, on the alternative path management TL 2050, with respect toeach path that its own host computers 2000, 2100 can utilize, registeredare a path number 205005 which is a sequential serial number of thepath, a WWN 205010 of a host port that the path uses, a WWN 205015 and aLUN 205020 of a storage port of a volume which can be accessed by thepath, and an alternative path number 205025 which is a path number of apath which can be utilized as an alternative path of the path. In anexample shown in FIG. 19, a path having a path number of “1” is a pathwhich accesses a LUN“0” of a storage port having a WWN of “S1a” from ahost port having a WWN of “H1a”, and a path number of an alternativepath is “2”.

The alternative path control PG 2045 is a program for controlling analternative path. The CPU 2040, by executing the alternative pathcontrol PG 2045 which is stored in a memory 2020, controls a path and analternative path which are used for an access to a volume. For example,in case that its own host computers 2000, 2100 transmit commands anddata to the storage devices 2400, 2500, if an alternative path is set upto a path which is used for transmission, one of these two paths isselected and used for transmission. Also, in case that transmission isfailed while each path is being monitored, and transmission fails, apath is switched with reference to the alternative path management TL2050, and transmission is carried out again through the switched path.In addition, selection and switching of a path by use of the alternativepath control PG 2045 are carried out transparently from a program whichcalls for transmission of a command and data.

An agent PG 2055 is a program for carrying out management of alternativepath. The CPU 2040, by executing the agent PG 2055 which is stored inthe memory 2020, carries out registration, update and transmission ofthe alternative path management TL 2050.

(2) Procedure of Transfer Process (Utilization of Alternative Path)

Procedure of transfer process that the management server 2200 carriesout in case of changing a system configuration in which the hostcomputers 2000, 2100 directly access the old storage device 2400, to asystem configuration in which they access the old storage device 2400through the new storage device 2500, will be described.

FIG. 20 is a flow chart for illustrating the transfer process that themanagement server 2200 carries out, in case of changing a systemconfiguration in which the host computers 2200, 2100 directly access theold storage device 2400, to a system configuration in which they accessthe old storage device 2400 through the new storage device 2500. Thisflow is started with executing the transfer control PG 2220, inaccordance with an instruction that the CPU 2205 of the managementserver 2200 received from an administrator.

Steps S9000 to S9015 are the same as the steps S3000 to S3015 shown inFIG. 7 of the first embodiment. In this regard, however, in the stepS9015, in order to continue operations of the host computers 2000, 2100,a zone of the FC SW 2300 is set up so as for the host computers 2000,2100 to be able to access the old storage device 2400.

Next, in the management server 2200, the CPU 2205 obtains an alternativepath management TL 2050 from the host computers 2000, 2100 (S9020).Concretely speaking, the CPU 2205 transmits an alternative pathmanagement TL request to the host computers 2000, 2100 through the LANI/F 2210. With respect to each of the host computers 2000, 2100, the CPU2040, when it receives the alternative oath management TL request fromthe management server 2200, reads out the alternative path management TL2050 from the memory 2020 with the agent PG 2055, and transmits it ofthe management server 2200. By this, the CPU 2205 of the managementserver 2200 receives the alternative path management TL 2050.

Next, the CPU 2205 of the management server 2200 selects a path to betransferred, out of the alternative path management TL 2050 which isobtained from the host computers 2000, 2100 (S9025). Judgment of a pathto be transferred is carried out as follows. That is, with reference tothe port management TL 2445 which is obtained from the old storagedevice 2400 in the step S9000, it is confirmed whether a WWN of astorage port which is registered in the entry 205015 of the alternativepath management TL 2050 is a WWN of a port of the old storage device2400 or not. And, all paths, whose path numbers are registered on thealternative path management TL 2050 of the host computers 2000, 2100 inassociation with the WWN of the confirmed storage port, are set as pathsto be transferred.

Steps S9030 to S9045 are the same as the steps S3020 to S3035 shown inFIG. 7 of the first embodiment. In this regard, however, in the stepS9035, in order that the host computers 2000, 2100 can access the oldstorage device 2400, on the port management TL 2445 of the old storagedevice 2400, WWNs or host ports of the host computers 2000, 2100 areremained unchanged in the entry 244525 as access permission WWN. Also, aWWN of an initiator port of the new storage device 2500 which isutilized for an access to a volume having a volume ID registered in theentry 244515 is added to the access permission WWN of an entry 244525which is associated with the entry 244515 in which the volume ID isregistered.

In steps S9050 to 9070, the transfer process is carried out overswitching an alternative path with respect to each port of the oldstorage device 2400, and a process for updating the alternative pathmanagement TL 2050 which relates to the port is repeated with respect toall paths to be transferred, which are selected in the step.

Firstly, in the step S9050, the CPU 2205 of the management server 2200selects one of paths to which the transfer process is not applied, outof paths which are selected in the step S9025.

Next, in the step S9055, the CPU 2205 of the management server 2200,with reference to the entry 205015 of the alternative path management TL2050 in which the selected path is registered, specifies a WWN of astorage port of the selected path. Also, a path other than the selectedpath, in which the WWN is registered in the entry 205015 is tried to befound from the alternative path management TL 2050 which is obtainedfrom the host computers 2000, 2100. And then, the CPU 2205 of themanagement server 2200 transmits a combination of a WWN of a host portand a WWN of a storage port in each path found, which are registered onthe alternative path management TL 2050 obtained from the host computers2000, 2100, to the old storage device 2400 through the LAN I/F 2210. TheCPU 2425 of the old storage device 2400, when it receives this, with thestorage control PC 2435, with respect to each combination of a WWN of ahost port and a WWN of a storage port which are received through the LANI/F 2415, deletes a WWN of a host port of the combination, from theentry 244525 of the access permission WWN which corresponds to the entry244505 in which a WWN of a storage port of the combination isregistered, on the port management TL 2445.

Therefore, on the port management TL 2445, in the access permission WWNwhich corresponds to a WWN of a storage port of the combination, only aWWN of an initiator port of the new storage device 2500 which isselected in the step S9030 remains. As a result of this, the old storagedevice 2400 rejects an access to the storage port from the hostcomputers 2000, 2100. In case that the host computers 2000, 2100 are inuse of this storage port, the CPU 2040 of the host computers 2000, 2100detects an access failure with the alternative path control PG 2045, andswitches a path to an alternative path. On this account, there is nocase that operations of the host computers 2000, 2100 are stopped.

A step S9060 is the step that the steps S3040, S3045 shown in FIG. 7 ofthe first embodiment are put into one group. In this regard, however,only a storage port of a path which is selected in the step S9050 isprocessed.

In a step S9065, the CPU 2205 of the management server 2200 changes aWWN of a storage port (storage port of the old storage device 2400) ofeach of the paths which are registered on the alternative pathmanagement TL 2050 obtained from the host computers 2000, 2100 and whichare found in the step S9050 to a WWN of an initiator port of the newstorage device 2500 which is selected in the step S9030. Also, a changedcontent of the corresponding alternative path management TL 2050 whichis registered in the memory computers 2000, 2100. The CPU 2040 of thehost computers 2000, 2100, when it receives this, updates thealternative path management TL 2050 which is registered in the memory2020 in accordance with the changed content which is notified from themanagement server 2200.

The CPU 2040 of the management server 2200, if there remains a path towhich the transfer process is not applied, among paths which areselected in the step S9025, returns to S9050 and repeats the process(step S9070).

As above, the third embodiment of this invention has been described.According to this embodiment, in addition to the above-describedadvantage of the first embodiment, it has the following advantage. Incase that the host computers 2000, 2100 have a plurality of paths whichare used for an access to the same volume, the transfer process to thevolume is carried out at least twice separately to the plurality ofpaths. That is, access restriction information of a port is transferredstepwise over switching alternative paths, and the transfer process canbe carried out without stopping operations of the hose computers 2000,2100.

In addition, this invention is not limited to each embodiment, andvarious modifications are possible within a scope of its substance. Forexample, in the above-described each embodiment, the case of changingfrom a system configuration in which the host computers 2000, 2100directly access the old storage device 2400, to a system configurationin which they access the old storage device 2400 through the new storagedevice 2500 has been described as an example. However, this invention isnot limited to these embodiments. The transfer process of accessrestriction information of this invention is applicable to a case ofchanging from a system configuration in which the host computers 2000,2100 access the old storage device 2400, to a system configuration inwhich they access the new storage device 2500, by transferring data ofthe old storage device 2400 to the new storage device 2500.

1. An access restriction information setting method which sets up accessrestriction information on a storage device, in a storage area networksystem having the storage device which determines right or wrong of anaccess request to a volume in accordance with access restrictioninformation which is set up on a port which receives the request, and ahost computer which transmits an access request to said storage devicethrough a first network,, comprising: a first step for obtaining accessrestriction information and information at a volume which are set up oneach port that a first storage device has, through a second network; asecond step for obtaining attribute information including a port typeand a status of utilization of each port that a second storage devicehas, from said second storage device through said second network; athird step for selecting a port of said second storage device which isutilized for an access to a volume that said first storage device has orhad, on the basis of attribute information of each port that said secondstorage device has, which is obtained in said second step; and a fourthstep for setting up, on a port of said second storage device which isselected in said third step, access restriction information of a port ofsaid first storage device to which a volume, of which the port isutilized for an access, is assigned, on the basis of access restrictioninformation and information of a volume of each port that said firststorage device has, which are obtained in said first step.
 2. An accessrestriction information setting method according to claim 1, whereinsaid third step selects a target port which is utilized for reception ofan access request to a volume that said first storage device has fromsaid host computer, and an initiator port which is utilized fortransmission of an access request to a volume that said first storagedevice has from said second storage device, and said fourth step setsup, on a target port of said second storage device which is selected insaid third step, access restriction information of a port of said firststorage device to which a volume, of which the port is utilized for anaccess, is assigned, and permits only an access request to accessrestriction information of said first storage device to which the volumeis assigned from an initiator port of said second storage device whichis selected in said third step.
 3. An access restriction informationsetting method according to claim 1, wherein said first step obtainsaccess restriction information which is set up on each port that a firststorage device has and information of a volume, from said first storagedevice through said second network.
 4. An access restriction informationsetting method according to claim 1, wherein said first step specifiesaccess restriction information which is set up on each port that a firststorage device has and information of a volume, by obtaining informationof a port of said host computer which is utilized for an access to avolume that said first storage device has and information of a port ofsaid first storage device, from said host computer through said secondnetwork.
 5. An access restriction information setting method accordingto claim 1, further comprising: a fifth step for changing a port of saidfirst storage device which is associated with each mount point of a filesystem of said host computer and a volume which is assigned to the port,to a port of said second storage device which is utilized for an accessto the volume and a volume which is defined on the port.
 6. An accessrestriction information setting method according to claim 1, whereinsaid first storage device sets up access restriction information on eachport, by use of a first management table in which an informationidentifier of a volume and a source port or an access to be permittedare listed with a LUN unit with respect to each port, and said secondstorage device sets up access restriction information on each port, byuse of a second management table in which a LUN and an identifier of avolume are listed with a group unit of source ports of an access to bepermitted with respect to each port, and said first step obtains saidfirst management table, and said fourth step prepares said secondmanagement table as to each port of said second storage device which isselected in said third step, on the basis of a listed content of saidfirst management table which is obtained in said first step as to eachport of said first storage device to which a volume, of which said portis utilized for an access, is assigned, and updates said secondmanagement table that said second storage device has.
 7. An accessrestriction information setting method according to claim 1, wherein incase that said host computer has a plurality of paths which are used foran access to the same volume, a process of said fourth step to thevolume is carried out at least twice separately to said plurality ofpaths.
 8. An access restriction information setting method according toclaim 1, wherein said second network is different from said firstnetwork.
 9. An access restriction information setting apparatus whichsets up access restriction information on a storage device, in a storagearea network system having the storage device which determines right orwrong of an access request to a volume in accordance with accessrestriction information which is set up on a port which receives therequest, and in a host computer which transmits an access request tosaid storage device through a first network, comprising: obtaining unitwhich obtains access restriction information and information of a volumewhich are set up on each port that a first storage device has, andattribute information including a port type and a status of utilizationof each port that a second storage device has, through a second network;selecting unit which selects a port of said second storage device whichis utilized for an access to a volume that said first storage device hasor had, on the basis of attribute information of each port that saidsecond storage device has, which is obtained in said obtaining unit; andsetting unit which sets up, on a port of said second storage devicewhich is selected in said selecting unit, access restriction informationof a port of said first storage device to which a volume, of which theport is utilized for an access, is assigned, on the basis of accessrestriction information and information of a volume of each port thatsaid first storage device has, which are obtained in said obtainingunit.
 10. An access restriction information setting system having firstand second storage devices which determine right or wrong of an accessrequest to a volume in accordance with access restriction informationwhich is set up on a port which receives the request, a host computerwhich transmits an access request to said first and second storagedevices through a first network, and an access restriction informationsetting device which is connected to said first and second storagedevices through a second network, wherein said access restrictioninformation setting device comprising: obtaining unit which obtainsaccess restriction information and information of a volume which are setup on each port that said first storage device has, and attributeinformation including a port type and a status of utilization of eachport that said second storage device has, through a second network;selecting unit which selects a port of said second storage device whichis utilized for an access to a volume that said first storage device hasor had, on the basis of attribute information of each port that saidsecond storage device has, which is obtained in said obtaining unit; andsetting unit which sets up, on a port of said second storage devicewhich is selected in said selection unit, access restriction informationof a port of said first storage device to which a volume, of which theport is utilized for an access, is assigned, on the basis of accessrestriction information and information of a volume of each port thatsaid first storage device has, which are obtained in said obtainingunit.
 11. A computer-readable program for setting access restrictioninformation on a storage device, in a storage area network system havingthe storage device which determines right or wrong of an access requestto a volume in accordance with access restriction information which isset up on a port which receives the request, and a host computer whichtransmits an access request to said storage device through a firstnetwork, wherein said program makes a computer execute: a first step forobtaining access restriction information and information of a volumewhich are set up on each port that a first storage device has, through asecond network; a second step for obtaining attribute informationincluding a port type and a status of utilization of each port that asecond storage device has, from said second storage device through saidsecond network: a third step for selecting a port of said second storagedevice which is utilized for an access to a volume that said firststorage device has or had, on the basis of attribute information of eachport that said second storage device has, which is obtained in saidsecond step; and a fourth step for setting up, on a port of said secondstorage device which is selected in said third step, access restrictioninformation of a port of said first storage device to which a volume, ofwhich the port is utilized for an access, is assigned, on the basis ofaccess restriction information and information of a volume of each portthat said first storage device has, which are obtained in said firststep.
 12. An access restriction information setting method in which, ina storage area network system having the storage device which determinesright or wrong of an access request to a volume in accordance withaccess restriction information which is set up on a port which receivesthe request, and a host computer which transmits an access request tosaid storage device through a first network, an access restrictioninformation setting device which is connected to said storage devicethrough a second network sets up access restriction information on saidstorage device, wherein said access restriction information settingdevice obtains access restriction information and information of avolume which are set up on each port that a first storage device has,through said second network, obtains attribute information including aport type and a status of utilization of each port that said secondstorage device has, from said second storage device through said secondnetwork, selects a port of said second storage device which is utilizedfor an access to a volume that said first storage device has or had, onthe basis of attribute information of each port that said second storagedevice has, which is obtained as above, and sets up, on a port of saidsecond storage device which is selected as above, access restrictioninformation of a port of said first storage device to which a volume, ofwhich the port is utilized for an access, is assigned, on the basis ofaccess restriction information and information of a volume of each portthat said first storage device has, which are obtained as above.
 13. Anaccess restriction information setting apparatus which sets up accessrestriction information on a storage device, in a storage area networksystem having the storage device which determines right or wrong of anaccess request to a volume in accordance with access restrictioninformation which is set up on a port which receives the request, and ahost computer which transmits an access request to said storage devicethrough a first network, comprising: a network I/F unit which isutilized for connecting to said second network, and a calculation unit,wherein, said calculation unit obtains access restriction informationand information of a volume which are set up on each port that a firststorage device has, from said first storage device and attributeinformation including a port type and a status of utilization of eachport that the second storage device has, from said second storagedevice, through said network I/F unit, selects a port or said secondstorage device which is utilized for an access to a volume that saidfirst storage device has or had, on the basis of attribute informationof each port that said second storage device has, which is obtained asabove, and sets up, on a port of said second storage device which isselected as above, through said network I/F unit, access restrictioninformation of a port of said first storage device to which a volume, ofwhich the port is utilized for an access, is assigned, on the basis ofaccess restriction information and information of a volume of each portthat said first storage device has, which are obtained as above.
 14. Anaccess restriction information setting system having first and secondstorage devices which determine right or wrong of an access request to avolume in accordance with access restriction information which is set upon a port which receives the request, a host computer which transmits anaccess request to said first and second storage devices through a firstnetwork, and an access restriction information setting device which isconnected to said first and second storage devices through a secondnetwork, wherein said access restriction information setting apparatushas a network I/F unit which is utilized for connecting to said secondnetwork, and a calculation unit, and said calculation unit obtainsaccess restriction information and information of a volume which are setup on each port that a first storage device has, and attributeinformation including a port type and a status of utilization of eachport that a second storage device has, from said second storage device,through said network I/F unit, selects a port of said second storagedevice which is utilized for an access to a volume that said firststorage device has or had, on the basis of attribute information of eachport that said second storage device has, which is obtained as above,and sets up, on a port of said second storage device which is selectedas above, through said network I/F unit, access restriction informationof a port of said first storage device to which a volume, of which theport is utilized for an access, is assigned, on the basis of accessrestriction information and information of a volume of each port thatsaid first storage device has, which are obtained as above.
 15. Anaccess restriction information setting system having first and secondstorage devices which determine right or wrong of an access request to avolume in accordance with access restriction information which is set upon a port which receives the request, a host computer which transmits anaccess request to said first and second storage devices, a Fibre Channelswitch which configures a Fibre Channel network which connects betweensaid first and second storage devices and said host computer, amanagement server which sets up access restriction information on saidfirst and second storage device, and a LAN which connects between saidfirst and second storage devices and said management server, whereinsaid first and second storage devices have a FC I/F which connects tosaid Fibre Channel switch, and said management server has a LAN I/F unitwhich is utilized for connecting to said LAN, and a calculation unit,and said calculation unit obtains access restriction information andinformation of a volume which are set up on each port of the FC I/F thata first storage device has from said first storage device, and attributeinformation including a port type and a status of utilization of eachport of the FC I/F that the second storage device has, from said secondstorage device, through said LAN I/F unit, selects a port of a FC I/F onsaid second storage device which is utilized for an access to a volumethat said first storage device has or had, on the basis of attributeinformation of each port of the FC I/F that said second storage devicehas, which is obtained as above, and sets up, on a port of the FC I/F ofsaid second storage device which is selected as above through said LANI/F unit, access restriction information of a port of the FC I/F of saidfirst storage device to which a volume, of which the port is utilizedfor an access, is assigned, on the basis of access restrictioninformation and information of a volume of each port of the FC I/F thatsaid first storage device has, which are obtained as above.
 16. Anaccess restriction information setting apparatus according to claim 13,wherein said calculation unit obtains the access restriction informationand the information of the volume which are set up on each port thatsaid first storage device has, from said first storage device, throughsaid second network, selects, as the port of the second storage, atarget port which is utilized for receiving an access request from saidhost computer to a volume that said first storage device has, and aninitiator port which is utilized for sending an access request from saidsecond storage device to a volume that said first storage device has,and sets up access restriction information of a port of said firststorage device to which a volume, of which the port is utilized for anaccess, is assigned, on the selected target port of the second storagedevice, and in addition, updates access restriction information of aport of said first storage device to which the volume is assigned so asto permit an access request only from the selected initiator port ofsaid second storage device.
 17. An access restriction informationsetting apparatus according to claim 13, wherein said calculation unitspecifies access restriction information which is set up on each portthat said first storage device has and information of a volume, byobtaining a port of said host computer which is utilized for an accessto a volume that said first storage device has and information of a portof said first storage device, from said host computer through saidsecond network.
 18. An access restriction information setting apparatusaccording to claim 13, wherein said calculation unit changes a port orsaid first storage device which is associated with each mount point of afile system of said host computer and a volume which is assigned to theport, to a port of said second storage device which is utilized for anaccess to the volume and a volume which is defined on the port.
 19. Anaccess restriction information setting apparatus according to claim 13,wherein said first storage device sets up access restriction informationon each port, by use of a first management table on which an informationidentifier of a volume and a source port of an access to be permittedare listed with a LUN unit with respect to each port, and said secondstorage device sets up access restriction information on each port, byuse of a second management table on which a LUN and an identifier of avolume are listed with a group unit of source ports of an access to bepermitted with respect to each port, and said calculation unit obtainssaid first management table, and prepares said second management tableas to each port of said second storage device which is selected asabove, on the basis of a listed content of said first management tableand updates said second management table which said second storagedevice has.
 20. An access restriction information setting apparatusaccording to claim 13, wherein in case that said host computer has aplurality of paths which are used for an access to the same volume, aprocess of setting up said access restriction information to a volume iscarried out at least twice separately to said plurality of paths.