Storage controller and computer system for managing information related to connection port

ABSTRACT

A storage controller determines a difference between a control table containing fiber channel port configuration of an upper node device and security information, and information fetched from a name server, thereby detecting replacement of a fiber channel port and correcting the control table. This enables data input/output in the same way as before fiber channel port replacement without consciously modifying the security information.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to a computer system including a storagedevice capable of managing security information and in particular totechnique for automatically reflecting modification of managedinformation caused by replacement of an error component of an upper nodedevice or the like to the security information.

2. Description of the Related Art

Technique of security for access to a storage controller from an uppernode device is disclosed, for example, in JP-A-10-333839 (correspondingto EP 0 881 560 A2) which provides a storage device having the securityfunction to prevent an unauthorized access from an upper node device bysetting port name information for uniquely identifying an upper nodedevice in the storage controller, so as to be compared with port nameinformation stored in a frame sent from the upper node device, therebydetermining whether the access is allowed.

However, according to the technique disclosed in JP-A-10-333839, when aninterface component of the upper node device is replaced with a new oneand a port name before the replacement is changed to a different portname after the replacement, it becomes impossible to access the new portname after the replacement due to security information set in thestorage controller. For this, it is necessary to correct the securitysetting on the storage device after the replacement. Since a fiberchannel can connect an upper node device to a storage controller viafabric, the upper node device may be at a distance from the storagecontroller. Accordingly, replacement of an interface component of theupper node device should be enabled without depending on the setting ofthe storage controller.

Moreover, since the port name is used as an identifier of the upper nodedevice, security setting depending on an upper node device has beenimpossible when the upper node device has a plurality of fiber channelports.

SUMMARY OF THE INVENTION

It is therefore an object of the present invention to provide a computersystem including an upper node device having a connection port, aninformation exchange device connected to the connection port andcontrolling packet transfer, and a storage controller connected to theinformation exchange device and sending/receiving a packet to/from theupper node device via the information exchange device.

The storage controller has a control table containing connection portidentification information and connection port security information. Thecontrol table may be created for each of the upper node device or thecontrol table may further contain identification information of theupper node device. The storage controller detects replacement of theconnection port according to information obtained from the informationexchange device. When a replacement of the connection port is detected,the connection port identification information in the control table isreplaced by new connection port identification information after thereplacement.

Thus, according to the present invention, the security information ofthe connection port before replacement can be retained in the securityinformation of the connection port after the replacement.

Moreover, when a node name is contained as the security information, foran upper node device having a plurality of fiber channel ports, it ispossible to set security depending on the upper node device.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows system configuration according to an embodiment of thepresent invention.

FIG. 2 shows a sequence for creating a control table required by theembodiment.

FIG. 3 shows an I/O specification of a standard extended link servicecapable of providing attribute information concerning a fiber channelport to be managed by the embodiment.

FIG. 4 shows a data transfer sequence of an ordinary fiber channel.

FIG. 5 shows a decision sequence when allowing an I/O request accordingto the embodiment.

FIG. 6 shows a control table correction sequence according to theembodiment when a fiber channel port is replaced or the like.

FIG. 7 shows a detection sequence detecting a fiber channel portreplaced according to the embodiment.

DESCRIPTION OF THE EMBODIMENTS

Firstly, referring to FIG. 1, explanation will be given on interface ofa fiber channel according to the present invention and a storage deviceusing the fiber channel interface.

FIG. 1 shows a configuration example of a storage system using a diskarray as a storage controller. In FIG. 1, reference numerals 10 and 20denote upper-node devices as CPU's for performing data processing. Eachof the upper node device 10, 20 has fiber channel ports 11, 12 and 21. Afiber channel port 13 is for replacement and is not mounted on the uppernode device 10 or 20. Each of the fiber channel ports 11, 12, 13 and 21has a port name as an identifier for uniquely identifying thecorresponding fiber channel port. Each of the upper node devices 10 and20 has a node name as an identifier for uniquely identifying thecorresponding upper node device. The reference numeral 40 denotes astorage controller of a disk array according to the present invention.The storage controller 40 is connected via a fabric 30 to the fiberchannel ports 11 and 12 of the upper node device 10 and the fiberchannel port 21 of the upper node device 20. The fabric 30 has thefunction of the name server 31 defined in the fiber channel standardspecification for collecting and providing attribute information of thedevices connected to the fabric 30, using an extended link service.

The storage controller 40 includes: a fiber channel controller 41performing data transfer to/from the upper node devices 10 and 20 andthe extended link service with the name server 31; a microprocessor 42controlling the entire storage controller; a memory 43 saving amicro-program controlling operation of the controller and control data;a data controller 44 controlling data read and write from/to a cache; acache 45 for temporarily buffering write data and read data from a diskdrive; a device interface controller 46 controlling data transferto/from the disk drive; and an input interface 47 for entering accesssecurity information.

A control table 38 for realizing the present invention is creased on thememory 43. The control table 38 contains fiber channel portconfiguration of the uppernode devices together with the securityinformation. The control table 38 is used to determine whether an accessto the upper node device is to be allowed and to detect replacement ofthe fiber channel port. Accordingly, the control table 38 is preferablysaved in a non-volatile region.

The reference numeral 50 denotes a disk array under the control by thestorage controller 40. The disk array 50 is a device for storing data ofthe upper node device and includes a plurality of disk drives arrangedso as to have redundancy. The disk array 50 is logically divided into aplurality of domains LU as SCSI access unit of the upper node device. Inthe present embodiment, the disk array 50 shows an example when havingtwo domains LU0 (51) and LU1 (52).

Referring to FIG. 2 and FIG. 3, explanation will be given on a sequencefor creating a control table from a user input by the storage controller40. In the example below, the security information uses a 64-bit portname for a fiber channel port which can be uniquely identified. In step61, a user uses the input interface 47 to enter a port name of the fiberchannel port of the upper node device which authorizes I/O. Uponreception of the user input, in step 62, the storage controller 40issues a link service request GNN_FT (Get Node Name by FC-4 Type) to thename server 31.

The name server 31 manages devices connected to the fabric in fiberchannel port basis and returns FS_RJT or FS_ACC in response to the linkservice request as shown in 68 in FIG. 3. Normally, when node nameinformation is referenced for a fiber channel port, a node name of theupper node device to which the fiber channel port belongs is indicated.

GNN_FT uses an I/O format shown in 69 in FIG. 3. GNN_FT is a linkservice for identifying the fiber channel port supporting a particularFC-4 Type among the devices connected to the fabric under management ofthe name server and returning its port ID and node name by FS_ACC.

In case of SCSI, 08 h is specified to the FC-4 type.

Thus, in step 62, the storage controller 40 can fetch the port ID andthe node name of the fiber channel port of the device supporting theSCSI. Next, in step 63, the storage controller 40 issues a link servicerequest GPN_ID (Get Port Name by Port ID) to the name server 31. TheGPN_ID has an I/O format shown in 70 in FIG. 3. The GPN_ID is a linkservice referencing the port name by the Port ID. In step 63, thestorage controller 40 repeats the GPN_ID using the port ID's fetched instep 62 and identifies the Port ID of the fiber channel port allowed forI/O by the user in step 61.

In step 64, the storage controller 40 uses the information fetched instep 62 to identify the node name of the fiber channel port allowed forI/O by the user in step 61 and then in step, using the sequence of steps65 and 66, the information fetched in step 62 is used to identify portnames of all the fiber channel ports of the upper node device specifiedby that node name. In step 67, the storage controller 40 adds securityinformation to the port name information fetched in step 66 so as toconstitute the fiber channel port configuration information of the uppernode device, thereby creating a control table 48. In step 67, an exampleis given for a case when an access is allowed only to the fiber channelport 11 among the fiber channel ports of FIG. 1.

Next, an example will be given on a data transfer by the upper nodedevice 10 via the storage controller 40 with the disk array 50 where I/Osecurity is applied using the control table 48.

FIG. 4 shows a sequence performed by the upper node device 10 to thestorage controller 40. In 72, the upper node device 10 issues a linkservice request of PLOGI (port log in) to the storage controller 40. Fornegotiation of various parameters required for data transfer, aparameter of the upper node device 10 is presented to a payload ofPLOGI. If data transfer is enabled, in 73, the parameter of the storagecontroller 40 is transferred to the upper node device 10 by the ACCpayload. If the data transfer is disabled, in 73, LS_RJT is returned tothe upper node device 10. When the PLOGI is responded by ACC, a SCSIcommand as shown in 74 is issued as a data frame from the upper nodedevice 10 to the storage controller 40. 74 shows an example of read.

The SCSI command in the data frame received by the fiber channelcontroller 41 is fetched and analyzed by the micro processor 42, and adata read request is issued via the device interface controller 46 tothe disk array 50. When the data is stored in the cache 45 via the datainterface controller 46 and the data controller 44, the micro processor42 reports a data transfer start to the upper node device 10 using adata frame FCP_XFER_RDY. Data transfer is performed using a data frameFCP_DATA and status transfer is performed using a data frame FCP_RSP,thereby completing access.

Here, when the security setting of 67 in FIG. 3 is performed, if theupper node device 10 accesses via the fiber channel port 11, datatransfer is performed but if the access is made via the fiber channelport 12, no data transfer is performed. For this, the storage controller40 performs a sequence shown in FIG. 5 upon reception of PLOGI. In step75, upon reception of PLOGI in step 75, the storage controller 40fetches the port name of step 76 and compares it with the control tablein step 77. If this port name can be accessed according to the controltable, ACC is issued in step 78 to report that the upper node device 10can be accessed. If the port name is disabled to be accessed in thecontrol table or if the port name is not loaded in the control table,LS_RJT is issued in step 79 so as to report that the upper node device10 cannot be accessed. Thus, security is assured for access to the uppernode device according to the present invention.

Next, explanation will be given on an automatic correction techniqueaccording to the present invention used when correction of the controltable 48 is required due to replacement of a fiber channel port. In FIG.1, for example, the fiber channel port 11 and the fiber channel port 13with a port name Adapter_C are replaced.

Correction of the control table 48 is performed when the storagecontroller 40 has received RSCN (registered state change notification)extended link service issued from the fabric 30. When a connection stateof each of the fiber channel ports of the devices connected to thefabric 30 is changed, the RSCN is reported with the port ID of the fiberchannel port to the respective devices. A plurality of port ID's mayalso be used.

FIG. 6 shows a control table correction sequence of the storagecontroller 40 which has received the RSCN. GNN_ID in step 83 is anextended link service indicating the format in 71 of FIG. 3 and the nodename can be referenced from the port ID. Firstly, when the fiber channelport 11 is disconnected from the fabric 30 for replacement, the fabric30 detects the disconnection and issues the RSCN to all the devicesconnected to the fabric 30. In step 83, the storage controller 40 issuesGNN_ID with the port ID fetched from the RSCN payload but since fiberchannel port 11 is deleted from the information in the name server 31,the storage controller 40 receives FS_RJT in step 84, therebyterminating the sequence of FIG. 6 without performing anything.

Next, the when fiber channel port 13 is loaded on the upper node device10 and connected to the fabric 30, the RSCN is issued from the fabric 30and accordingly, the storage controller 40 again performs the processsequence of FIG. 6. The node name fetched in step 83 is the one for theupper node device 10 for which the fiber channel port has been replacedand is contained in the control table 48. Accordingly, the processproceeds from step 85 to step 86.

FIG. 7 shows a current table/difference table creation sequence in step86. In order to create a list of port names of fiber channel portspresent on the current upper node device 10, the storage controller 40issues GNN_FT in step 93, and fetches the port ID's of the fiber channelports present on the upper node device 10 in step 94 and converts theport ID's into port names in step 95. A difference between the currenttable created in step 96 and the control table, to which the securityinformation is added so as to create the difference table shown in step97. In the example shown in step 97, the difference direction of thefiber channel port 11 is minus and the difference direction of the fiberchannel port 13 is plus in the difference table.

Returning to FIG. 6, explanation on the correction technique of thecontrol table will be continued. The fiber channel port having a minusdifference direction and enabled for access indicates that the fiberchannel port for which access is allowed is not operating. The fiberchannel port having a plus difference direction indicates that a newfiber channel port is added to replace the fiber channel port notoperating.

In the sequence of FIG. 6, step 87 and step 88 identifies the fiberchannel port before the replacement and the fiber channel port after thereplacement, and step 89 corrects the port name on the control table. Instep 89, for the fiber channel port having the minus directiondifference, the port name is replaced by the port name of the fiberchannel port having the plus direction difference.

Moreover, when no fiber channel port having the minus directiondifference is present (in sequence 90 of FIG. 6) but a fiber channelport having the plus direction difference is present, this means that anadditional fiber channel port is placed. In this case, in 91 of FIG. 6,a port name is added in the control table together with the accessdisabled attribute, so as to eliminate trouble during fiber channel portreplacement.

Here, if the upper node device should be stopped when adding a fiberchannel port, after the fiber channel port is added, upon start of theupper node device, the start order of the fiber channel ports may not bedetermined and the fiber channel port to be added may be identified asthe fiber channel port after the replacement. However, this can beeliminated by starting the upper node device without connecting thefiber channel port to be added, to the fabric, or by applying a historymethod to the port name correction in step 89 of FIG. 6.

Further, it is possible to provide a storage controller enabling finersecurity management by assuming storage domains correlating each ofresources such as a plurality of LUs managed by the storage controllerand a plurality of fiber channel controllers and by having a controltable for each of the storage areas.

Furthermore, by accepting a node name as the security information inputand allowing all the data I/O received from this node name, the uppernode device having a plenty of fiber channel ports can reduce the stepsrequired for checking and setting the respective fiber channel portsidentifiers.

Accordingly, when a node name is contained in the security information,it is possible to perform security setting depending on an upper nodedevice when the upper node device has a plurality of fiber channelports.

As has been described above, the storage controller 40 receives a portname input of a fiber channel port of an upper node device and has theport name list of the fiber channel ports of the upper node device foreach of the node names of the upper node device and the control tablecontaining the I/O enabling/disabling information, so that a node namewhich can be fetched from the fabric is compared to the port name list,thereby detecting a fiber channel port replacement of the upper nodedevice. In the control table, the port name of the fiber channel portreplaced is rewritten by the port name of the fiber channel port afterthe replacement. Thus, the upper node device can perform data I/O forthe storage controller in the same way as before the fiber channel portreplacement.

According to the present invention, for a storage controller connectedto a fabric and supplied with a fiber channel port identifier assecurity information, when a fiber channel port of the upper node deviceis replaced, data I/O can be performed in the same way as before a fiberchannel port replacement without consciously modifying the securityinformation.

1. A computer system comprising: at least one upper node device each having at least one connection port; an information exchanger connected to the connection port for controlling packet transfer; and a storage controller connected to the information exchanger for passing a packet via the information exchanger with the upper node device, wherein the storage controller has a control table containing identification information of the upper node device, identification information of the connection port and security information of the connection port, and when connection status of an input/output port was changed in the upper node device, replacement of the connection port is detected by the storage controller on the basis of information notified from the information exchanger, and in the control table, the identification information of the connection port before replacement is replaced with identification information of the connection port after the replacement, and in case that the security information of the connection port before replacement was access enabled, security information of the connection port after replacement is set to be access enabled in the control table, and for a newly added input/output port, identification information of corresponding upper node device, identification information of the newly added input/output port and security information in which access disabled is set are registered in the control table; and wherein said security information is added to the port name information so as to constitute the fiber channel port configuration information of the upper node device.
 2. The computer system as claimed in claim 1, wherein upon detection of disconnection of a first connection port from the information exchanger and connection of a second connection port to the information exchanger, the storage controller detects that the first connection port is replaced by the second connection port.
 3. The computer system as claimed in claim 1, wherein the control table is provided for each of the upper node devices.
 4. The computer system as claimed in claim 3, wherein the storage controller is connected to a storage device having a plurality of storage domains and the access enabled/disabled state is managed for each of the storage domains and for each of the fiber channel ports.
 5. The computer system as claimed in claim 1 , wherein interface between the upper node device and the storage controller is a fiber channel standardized by ANSI X3T11. 