HP StorageWorks XP24000/XP20000 Audit Log Reference Guide (AE131-96085, May 2011)

Receiving Command from the Host
Table 7 (page 36) shows the interface name and the operation name output to the Audit Log
Information File in receiving command from the host. For details about the interface name and the
operation name, see “Audit Log Information for the Commands Sent from the Host” (page 252).
Table 7 Interface Name and Operation Name Output to Audit Log Information File
Name of Corresponding Function and
Operation
PageInterface Name and Operation Name
The FC-SP authentication has ended.“FC-SP Operation Name (page
252)
FC-SP
The mainframe system host or the
storage system has sent the commands.
“M/F I/F Interface Name (page
252)
M/F I/F
The open system host (RAID Manager
or RAID Manager interface) or the
storage system has sent the commands.
“OPEN I/F Interface Name” (page
252)
OPEN I/F
DKA Encryption License Key Operation
Table 8 (page 36) shows the function name and the operation name concerning the encryption
key used for DKA Encryption License Key. The functions in Table 8 (page 36) are listed in
alphabetical order. For details about the function name and the operation name shown in
Table 8 (page 36), see “Audit Log Information about the Key Used for the Encryption License Key”
(page 254).
Table 8 Function Name and Operation Name Output to Audit Log Information File
Corresponding Function and Operation
Name
Operation NameFunction Name
DKA Encryption License Key creating
function
NOTE: Output when the LDEV format
operation is performed, if the DKA
Encryption License Key is created by
the storage system.
Create Enc. KeyENC
EncryptionEnc. Key Backup
Enc. Key Restore
Virtual LVI/LUN VLLPG Enc. Set
Creation of encryption key on SVPSet Encryption KeyInstall
PIN Deletion Tool Operation
“Function Name and Operation Name Output to Audit Log Information File (page 36) shows the
function name and the operation name concerning the PIN deletion tool. For details about the
function name and the operation name, see “PINDeletion Function Delete Operation (page 255).
Table 9 Function Name and Operation Name Output to Audit Log Information File
Corresponding Function and Operation
Name
Operation NameFunction Name
PIN deletion operation by PIN deletion
tool
DeletePINDeletion
36 Information Output in the Audit Log Information File