The
following
elements
can
be
reconfigured
from
the
z/OS
Operator’s
console
using
a
CONFIG
command.
Such
a
reconfiguration
is
limited
to
the
objects
owned
by
the
logical
partition:
v
Logical
Processors
v
Central
Storage
v
Expanded
Storage
v
Channel
Paths
See
z/OS
MVS
System
Commands
for
further
detail
on
the
CONFIG
command.
MVS
is
aware
of
the
logical
partition
objects
it
owns,
and
interacts
with
PR/SM
to
reconfigure
them
using
the
service
call
instruction.
This
Execution
of
this
instruction
results
in
a
mandatory
interception
(by
the
System
z9
processor
hardware)
which
causes
every
use
thereof
to
be
mediated
by
PR/SM.
PR/SM
mediates
the
instruction
to
limit
the
scope
of
such
requests
to
the
objects
that
the
security
administrator
defined
for
the
specific
logical
partition.
Audit
Trail
All
security-relevant
events
initiated
from
the
HMC/SE
by
the
System
Administrator
will
be
written
to
the
security
log.
When
these
logs
become
full,
they
are
pruned
.
This
means
that
the
oldest
one-third
of
the
entries
are
deleted
and
the
log
is
reduced
to
two-thirds
full.
The
log
has
the
capability
to
store
many
weeks
worth
of
security
relevant
events
under
normal
system
operation.
To
insure
the
no
security
relevant
information
is
lost,
the
security
log
should
be
offloaded
periodically
to
removable
media
provided
with
the
processor.
When
the
security
log
is
successfully
off
loaded
to
removeable
media,
the
active
log
is
pruned
so
that
it
does
not
exceed
20%
of
it’s
capacity.
If
the
active
security
log
is
below
20%,
then
no
entries
are
removed.
If
it
is
above
20%,
then
enough
active
security
log
entries
are
removed
(from
oldest
to
newest)
to
reduce
the
size
of
the
active
security
log
to
20%.
The
oldest
entries
are
still
in
the
offloaded
log.
Refer
to
the
Support
Element
Operations
Guide
for
additional
information
on
how
to
look
at
the
contents
of
the
security
log.
Recovery
Planning
You
should
read
and
then
adapt
it
to
your
configuration’s
requirements
for
security
and
processing
priorities.
Installation-specific
recovery
procedures
must
be
developed
and
documented
in
advance,
always
giving
consideration
to
where
the
sensitive
data
will
be
after
each
recovery
scenario
has
completed.
Service
and
Maintenance
Many
secure
accounts
are
hesitant
about
enabling
remote
service.
Consideration
should
be
given
to
enabling
outbound
RSF
calls
that
contain
the
data
necessary
to
automatically
dispatch
an
IBM
service
representative.
Since
there
is
considerable
customizing
capability
provided,
RSF
can
probably
be
tailored
to
match
your
installation’s
security
policy
and
practices.
This
product
has
support
for
the
concurrent
service
and
maintenance
of
hardware.
The
following
can
be
serviced
concurrently
while
normal
customer
operations
continue:
v
Power
supplies
v
Channel
cards
Appendix
B.
Developing,
Building,
and
Delivering
a
Certified
System
B-11
Содержание Z9
Страница 1: ...System z9 Processor Resource Systems Manager Planning Guide SB10 7041 03...
Страница 2: ......
Страница 3: ...System z9 Processor Resource Systems Manager Planning Guide SB10 7041 03...
Страница 12: ...x PR SM Planning Guide...
Страница 18: ...xvi PR SM Planning Guide...
Страница 26: ...xxiv PR SM Planning Guide...
Страница 43: ...ZVSE ZVM Figure 1 1 Characteristics of Logical Partitions Chapter 1 Introduction to Logical Partitions 1 17...
Страница 54: ...1 28 PR SM Planning Guide...
Страница 126: ...2 72 PR SM Planning Guide...
Страница 195: ...Figure 3 23 Security Page Image Profile Chapter 3 Determining the Characteristics of Logical Partitions 3 69...
Страница 220: ...4 8 PR SM Planning Guide...
Страница 232: ...5 12 PR SM Planning Guide...
Страница 250: ...B 16 PR SM Planning Guide...
Страница 266: ...D 10 PR SM Planning Guide...
Страница 272: ...X 6 PR SM Planning Guide...
Страница 273: ......
Страница 274: ...Printed in USA SB10 7041 03...