Technical data
Managing Storage Media
9.4 Protecting Volumes
9.4.2.1 Using the /PROTECTION Qualifier with Tape Volumes
If you use the /PROTECTION qualifier when you initialize tape volumes, the
protection code is written to a system-specific volume label.
With the /PROTECTION qualifier, the system applies only read (R) and write (W)
access restrictions. (Execute [E] and delete [D] access do not apply.) The system
and the owner always receive both read (R) and write (W) access to magnetic
tapes, regardless of the protection code you specify.
9.4.2.2 Protecting Tape Volumes for Interchange Environments
You can protect tape volumes for interchange between OpenVMS and other
operating systems.
The following list contains guidelines for protecting specific types of magnetic
tapes:
• With tapes processed on any operating system that supports a version of
the ANSI standard later than Version 3, the system processes accessibility
information in the first volume label.
• To process magnetic tapes created on a Compaq operating system other
than the OpenVMS operating system Version 4.0 or later, a user must have
VOLPRO privilege and must explicitly override the check on the protection as
follows:
If the tape was created with a specified accessibility, then a user must
have the appropriate privilege and must explicitly override the check on
accessibility.
If the tape volume was not created with such a protection scheme, then a
user is granted read and write access to that tape volume.
• The tape file system allows you to specify values for the fields in which other
Compaq operating systems currently write their protection information.
Except under the conditions described in the last bulleted item, the OpenVMS
operating system does not process these fields. Thus, you can use these fields
to store the protection values for another operating system without affecting
the system protection characteristics on that particular volume.
9.4.3 Auditing Volume Access
You can enable auditing for the volume object class; the system then audits disk
volume access, with the following exceptions:
• The system does not audit volume creation or deletion.
• The system does not audit access for tapes, ODS-1, or foreign-mounted
volumes.
9.5 Mounting Volumes
Mounting a disk or tape volume establishes a relationship between the volume
and the device on which the volume is physically loaded. After you mount
a volume, the system knows it exists, and users can access it. (This section
assumes that you are performing the mount operation yourself.)
Managing Storage Media 9–27










