Ingrasys nastorage 4600 series User Manual

Tower / 1u / 2u rack mount
Table of Contents

Advertisement

NAStorage 4600 / 12600 / 12620 Series
Tower / 1U / 2U Rack mount

User Manual

Rev. 1.1
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the nastorage 4600 series and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Ingrasys nastorage 4600 series

  • Page 1: User Manual

    NAStorage 4600 / 12600 / 12620 Series Tower / 1U / 2U Rack mount User Manual Rev. 1.1...
  • Page 2: Electronic Emission Notice

    Electronic Emission Notice Federal Communications Commission (FCC) This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.
  • Page 3: Safety Information

    Safety Information To reduce the risk of fire or electric shock, install the unit in a temperature-controlled indoor area free of conductive contaminants. Do not place the unit near liquids or in an excessively humid environment. Do not allow liquids or foreign objects to enter the unit. All servicing of this equipment must be performed by qualified service personnel.
  • Page 4: Table Of Contents

    Table of Contents Electronic Emission Notice• ..................2 Safety Information• ....................... 3 Table of Contents• ......................4 Chapter 1 Introduction• ....................7 1.1 Features• ........................ 7 1.2 Conventions• ......................7 1.3 Overview• ....................... 8 4600T Front View• ..................8 4600U Front View• ..................10 4600U Rear View•...
  • Page 5 3.8. System > Platform IPMI• ..................71 Chapter 4 Storage• ..................... 72 4.1. Storage > Disks • ....................72 4.2. Storage > Volumes • .................... 78 4.2.1 Volumes• ..................79 4.2.2 Disk Operation• ................83 4.2.3 External FAT/NTFS• .................87 4.3 Storage > Folder Groups• ..................88 4.3.1 Folder Groups•...
  • Page 6 Chapter 10 Event• ....................146 10.1. Event > Configuration • ..................146 10.2. Event > Reminder • ..................147 10.3. Event > System • ..................... 148 10.4. Event > Device • ....................149 10.5. Event > Security• ..................... 150 Chapter 11 Status•....................152 11.1.
  • Page 7: Chapter 1 Introduction

    Chapter 1 Introduction 1.1 Features The NAS server is a premier NAS product featuring tera-bytes of massive storage capacity and full-range data protection to provide a cost-effective, highly reliable and high- performance storage system for the fast growing network storage demand. •...
  • Page 8: Overview

    1.3 Overview 4600T Front View Front cover, it can protect your hard disks cannot be easily removed by unauthorized persons. Power button. NOTE: This power button is only enabled when NAS front cover is opened, it’s a secure design to defend invader from powering off the system. Power LED - blue System Read/Write LED - Orange Front cover bezel lock.
  • Page 9 4600T LED Definitions LED1 (Status / error) LED2 (Disk access) Definition Constant Green No access to H.D.D. Constant Green Blinking Green Access to H.D.D. LED1 LED2 4600T Rear View F a n e x h a u s t outlet Power Socket LAN or WAN LAN2 - LAN1...
  • Page 10: 4600U Front View

    4600U Front View Power button USB ports & LEDs HDD tray 1 HDD tray 2 HDD tray 3 HDD tray 4 4600U LED & Push button Definitions * Items are listed according to their positions from left to right. LED / Button Definition Power button Power the system on or off (pressed for one second)
  • Page 11: 12600 Series Front View

    12600 Series Front View Power button Reset button USB ports UID button Status LEDs 12600U Rear View ID switch IPMI SATA expansion Power supplies ports Serial FC ports ports LAN or WAN USB ports 12620U Rear View IPMI ID switch Power supplies SATA expansion port...
  • Page 12: System Led Definitions

    System LED Definitions Front Panel Indicator/error Color Description System Status (BMC) - ON Amber Event in BMC marked with *** has happened System Status - Blinking Amber Voltage sensor critical System Status - ON Green System working normally System Status - Blinking Green Fan/Temp sensor critical or chassis intrusion alert HDD - Blinking...
  • Page 13: Chapter 2 Installing And Starting The Nas System

    Chapter 2 Installing and Starting the NAS System This chapter covers the installation procedure of different form factors of NAS server in the tower or rack-mount chassis. Instructions on how to startup the NAS server by setting up the basic configuration through the Admin Home page or provided software tool – NASFinder is also outlined in this chapter.
  • Page 14: Hardware Installation - 4600T

    IMPORTANT: 1. It is important to leave a clearance of 15cm to the rear side of the chassis. The clear- ance is required to ensure an adequate airflow through the chassis to ventilate heat. A 5cm clearance is also required on both sides of the chassis. To ensure normal operation, maintain ambient airflow.
  • Page 15 4. Install your hard disk to the drive tray. Gently put the hard disk into drive tray with its la- bel side facing up and the connector side facing the inside of the chassis. Secure the hard drive by fastening 4 screws from both sides. IMPORTANT: Avoid touching the hard drive's circuit board or connector pins.
  • Page 16 6. Use the bezel key to lock the drive tray. Repeat the above process to install more disk drives. Bezel Lock...
  • Page 17: Interface Connections - 4600T

    2.2 Interface Connections - 4600T LAN / WAN Item no. Description Connect LAN ports to a local area network Power cord to the power supply (110~240V, 3.5A, 47~63Hz). 15-pin VGA and HDMI to monitor. eSATA port for backup to external storage devices. USB ports to USB devices, e.g., thumb disks for backup, keyboard, and mouse.
  • Page 18: Hardware Installation - Rackmount Enclosures (4600U, 12600U, 12620U)

    2.3 Hardware Installation - Rackmount Enclosures (4600U, 12600U, 12620U) The mounting holes and installation methods are identical for the rack-mount models 12600U and the 12620U. Follow the procedure to install a rackmount enclosure to a rack cabinet: 1. Remove all HDD trays from the server. 2.
  • Page 19 3. Remove the inner rail from the slide rail assembly. Pull out the inner rail, and then pull the release tab to remove it from the rail assembly.
  • Page 20 4. Align the inner rail with the protruding rivet head, and then push the inner rail towards the front of the enclosure. The inner rail should snap fit to the side of enclosure.
  • Page 21 5. Secure the inner rail to the side of enclosure using 3 included flathead screws. Repeat the above process to install another inner rail to the right hand side of the enclosure.
  • Page 22 6. 6-1. Make sure the middle rails are pulled to the front. 6-2. Lift the enclosure into position and then insert the tips of the inner rails into the en- trance point on each of the middle rails. 6-3. Slowly move the enclosure in to engage the inner rails with the slide rail assembly. 6-4.
  • Page 23: Hardware Installation - Rackmount Enclosures (12600U & 12620U)

    2.4 Hardware Installation - Rackmount Enclosures (12600U & 12620U) The mounting holes and installation methods are identical for the rack-mount models 12600U and the 12620U. Follow the procedure to install a 2U rackmount enclosure to a rack cabinet: 1. Attach the inner and middle rails to the rack cabinet. See previous description. 2.
  • Page 24 3. Attach the inner rails to the sides of the chassis. 4. Gradually slide the chassis into rack.
  • Page 25 5. Engage the tips of inner rails with that already installed on the cabinet. Push the chassis into the cabinet.
  • Page 26: Installing Disk Drives - 4600U, 12600U And 12620U

    2.4 Installing Disk Drives - 4600U, 12600U and 12620U Follow the procedure to install a rack mount enclosure: 1. Remove a HDD tray from the server by press the release tab. 2. Secure and mount a hard disk onto the HDD tray using four screws from the sides of the tray.
  • Page 27: Optional Pci-E Adaptor Installation (Only For 12600U & 12620U)

    8. Close your server case and plug in your power cable. 9. Turn on the NAS server. 10. New PCI-E adaptor is now installed. Note that only the PCI-E cards certified by Ingrasys can be installed into chassis. Please consult our availability list or website updates for details.
  • Page 28: Connecting Expansion Enclosures (For 12600U & 12620U)

    2.6 Connecting Expansion Enclosures (for 12600U & 12620U) 1. To connect expansion enclosures (the 1200J) to the 12600U NAS, first use a small- size Phillips screw to set up the enclosure IDs. These IDs are necessary to address the WWN addresses for the hard disks inside the expansion enclosures. Set the NAS server ID to 0, and the IDs on the JBOD enclosures consecutively.
  • Page 29 2. Connect cables between enclosures as shown below. Also make sure the enclosure IDs are properly configured. Port 1 Port 0 12600U ID=0 JBOD #1 1200J ID=1 JBOD #2 1200J ID=2 JBOD #3 1200J ID=3 IMPORTANT: 1. For the 12620U model, there is no ID switch. The chassis has a default ID, #0, and there is no need to change this default ID.
  • Page 30: Starting The System

    2.7 Starting the System 1. Make sure the power switch on the power supply is in ON position. 2. Press the power button - Tower - press the button on the front. Rack chassis - press the Power button on the left of the front panel of your NAS server.
  • Page 31: Drive Tray Led Definitions

    2.9 Drive Tray LED Definitions LED1 (up) Red LED2 (down) Blue Description Indicator/error HDD Access Lit Blue constantly No activities on HDD Blue blinking HDD read/write activities Lit constantly Faulty HDD Red blinking intermittently Volume being created or rebuilt Red blinking rapidly Volume has already been exported (unmounted), and is ready for removal.
  • Page 32: Install The Nasfinder Utility

    2.10 Install the NASFinder Utility 1. A NASFinder utility software is included in your product CD. The default system IP is 192.168.1.1. The default administrator account and password are: admin and admin. 2. Install the utility by starting the NASFinder-Setup.exe. 3.
  • Page 33 4. A desktop icon will be placed. Double-click on it to start the program. 5. After a brief search, the NAS server will be listed with its MAC address, IP, and server name shown on the screen. Click to select its checkbox. NOTE: The NAS server comes with a default IP, <192.168.1.1>.
  • Page 34 6. After the change to listening to a DHCP server, you need to connect the cables to a network switch or router where a DHCP server is present. Make sure your DHCP server is up and running and can be reached by both the network switch and the management computer.
  • Page 35 If there are multiple NAS servers in your network, you can select the checkboxes in front of them and enlist them into the management queue. The basic functions of the NASFinder are described as follows: Search Click to poll the presence of NAS server(s) in your local network. Admin Allows you to change the Admin account and password.
  • Page 36: Using The Top Screen Tools

    You can access the management GUI by clicking on the Web GUI button. Enter "admin" and "admin" as the user name and password at the initial startup. You may also key in the "http://<IP address>/admin/zf/public/" in your browser's URL field to start a management session. NOTE: Once you logged in and left your web console unattended for 5 minutes, the server will require you to log in again the next time you access the web console to prevent...
  • Page 37: Configuring Ip Address Using The Lcd Keypad (Tower 4600T Only)

    2.12 Configuring IP Address Using the LCD Keypad (Tower 4600T Only) LCD menu console flowchart System Ready Configure LAN 1 LAN 1 mask: LAN 1 gateway LAN 1 IP: Configure LAN 1? IP/Gateway/Mask 255.255.0.0 192.168.1.254 192.168.1.1 Yes/No LAN 2 mask: LAN 2 gateway LAN 2 IP: Configure LAN 2?
  • Page 38 Configuring IP address using the LCD console. 1. After the server boots up, the LCD console displays System Ready. Press the right button. System Ready Left Enter Right 2. The IP address of LAN 1 is shown. Press the Enter button to configure its IP address. Note that the symbol on the upper right corner indicates that the IP address can be configured using the LCD console.
  • Page 39 4. Move the cursor to the correct position using the left / right buttons. Then press the Enter key to change a number. LAN IP: 92.168.170.171 5. After you edit the last digit of the IP address, press the right button and configure the Subnet Mask address.
  • Page 40: Chapter 3 Managing & Setup: System

    Chapter 3 Managing & Setup: System The system menu provides access to the system overview, system operating status, network configuration, maintenance, configuration, and system log configuration pages. 3.1. System General Page The General page provides access to changing the Host Name, Domain, system description, and a Server Identify function.
  • Page 41 Date/Time The Date/Time window displays the current system time, and allows you to configure the time zone, and the use of an NTP (Network Time Protocol). To configure the time zone, click on the empty Etc/UTC entry field. A pull-down menu of all time zones on earth will be available from the pull-down list.
  • Page 42: System > Overview

    You can also acquire an accurate time from a time server on the network provided that you have a network connection to the Internet. The default is "pool.ntp.org." You may then specify the intervals your NAS server synchronize its time with the time server.
  • Page 43: System > General

    3.3. System > General Please refer to page 40 for information on the General page. 3.4. System > Network 3.4.1 System > Network > Information The Network Information page displays the current networking including: 1. Teaming Info: LAN port Link Aggregation setup. See the next section for details. 2.
  • Page 44: System > Network > Lan/Ip

    3.4.2 System > Network > LAN/IP The Network LAN/IP page provides access to your local network configurations. 1. LAN Port Setting - Network teaming mode: The Bison series supports IEEE 802.3ad Link Aggregation that enables methods of combining (aggregating) multiple network connections in parallel to increase throughput and provides redundancy in case of single link failures.
  • Page 45 LACP (Link Aggregation Control Protocol) - Combining physical ports together can occur such that multiple interfaces share one logical address (i.e. IP) or each physical address (i.e. MAC address) has its own address. LACP takes effects by sending frames down all links that have the protocol enabled. If the protocol finds a device on the opposite end of the link is LACP-enabled, frames will be sent over multiple links as if they are transmitted over a single logical link.
  • Page 46 2. Port - LAN1 and LAN2 Obtain DHCP automatically - Acquires an IP address from a DHCP server within your local network. This is not a default, and is configurable after you log in using the default 192.168.1.1 address. Manual setting - Select the Manual setting check circle to manually enter a static IP address, network mask, gateway IP address, Jumbo Frame(MTU), and the Wake on LAN options.
  • Page 47: Ssl Settings

    3.4.3 SSL Settings The NAS server enables secure web access by supporting SSL 3.0, both for the user homepage and the administration homepage. To use SSL 3.0, the NAS server will generate a server certificate for authentication and data encryption. By default, the server certificate is issued to the NAS server designated by its IP address.
  • Page 48 For clients to access server web-pages with secure connection, they have to install the CA certificate first. First go to the Network→SSL page. Click Download and install CA certificate hyperlink. Choose to install the certificate when a dialog-box pops up. Once the CA certificate is installed, the client can access all NAS server's web pages via SSL encrypted connection.
  • Page 49 2. On the management computer, open a web browser, e.g., IE. Click on the Tools button, and enter the Internet options page. 3. Click Content, and Certificates on the Internet Options page.
  • Page 50 4. Click to open the Trusted Root Certification Authorities tab. Click the Import button.
  • Page 51 5. The Import Wizard page will start. Click Next. 6. Click Browse to locate the certificate file you download. Click Next to proceed.
  • Page 52 7. Select the location where you want to store the certificate and related information. 8. Click Yes on the Security Warning prompt.
  • Page 53 9. Click Finish to complete the process. 10. Now return to the NAS sever console, System > Maintenance. Select the Enable https(SSL) connection checkbox and enter the default Https Port number (default is 443). On leaving the page, enter the administrator's login password, and click the Apply button.
  • Page 54 11. Also make sure the SSL option has been enabled on your browser's Internet Options. 12. You can now enter <https://NAS server IP address/> to start a secure and encrypted management access.
  • Page 55: System > Maintenance

    3.5. System > Maintenance The Maintenace page provides access to Administrator's account, System Volume, SNMP, Email, Reboot/Shutdown, Firmware-related, and reset to default settings. 3.5.1 System > Maintenance > Admin This window provides you with the configuration options to change the Administrator's password.
  • Page 56 3.5.2 System > Maintenance > System Volume Configure System Volume for System Services You can specify the location of the system Folder Group, which is required for saving system files or performing related functions. System Volume If you have created more than one volume, you can specify which is the default system volume.
  • Page 57 3.5.3 System > Maintenance > SNMP Simple network management protocol (SNMP) allows system administrators to access NAS server operating statuses via a 3rd-party SNMP software. The SNMP trap related configuration is found in the Event > Configuration window. If only SNMP trap service is preferred, you may not need to enable the service in here.
  • Page 58 2. Please download or acquire MG-SOFT MIB browser (or similar SNMP utility): http://www.mg-soft.si/download.html 3. Open the MG-SOFT MIB Compiler, and select the NAS server's MIB file you previously downloaded. . 4. Select the Ingrasys MIB module and then click Save to proceed.
  • Page 59 5. Save the compiled module to a position as shown below.
  • Page 60 6. Open the MIB browser. 7. When the MIB browser is started, click on the MIB tab. Search and locate the IngraNAS- MIB module from the list below.
  • Page 61 8. Enter the Remote SNMP agent's IP (that of your NAS server), and then click on the Query button. 9. The SNMP Protocol Preferences window will prompt. Configure the SNMP version, Community settings to the same configuration on your NAS server.
  • Page 62 10. When successfully connected, the Ingrasys MIB location will be shown. Note that currently the NAS server supports the Get command only. Right-click on the MIB profile entry to select the Get command.
  • Page 63 3.5.4 System > Maintenance > Email To enable Email notification from the server, 1. Enter a valid email account, an SMTP server address, and if SSL certification is required, select the SSL option. Note that TLS certification is currently not supported. 2.
  • Page 64 3.5.5 System > Maintenance > Reboot/Shutdown Shutdown and Reboot In addition to the quick access button on the upper-right of the management session, you can reboot or shutdown the server from here. Schedule Reboot You can configure the server to reboot according to a preset schedule. 1.
  • Page 65 To upload a firmware, first you should download the firmware from Ingrasys' website: www. Ingrasys.com. Save the firmware file to your management PC. Use the Upload button to locate the firmware file, and then click the Upgrade button to proceed.
  • Page 66 3.5.7 System > Maintenance > Reset to Default This window allows you to restore system defaults. All previous system configuration will be erased and returned to factory defaults. The data stored on your disk volume will remain intact. Note that the server IP will be restored to 192.168.1.1, and the default password will become the original "admin".
  • Page 67: System > Configuration

    3.6. System > Configuration The Configuration page provides means to back up your system configuration. 1. Backup Configuration: Immediately creates a backup of your current configurations. 2. Configuration Backup Schedule: Click the checkbox to enable the options and pull- down menus. You can then specify a day for the backup to take place on a daily or monthly basis.
  • Page 68 The Restore page allows you to restore your current configuration to the previous state using a previous backup. 1. You can select a previous backup using the drop-down menu by selecting the date it was created. 2. If you saved your backup to somewhere else, e.g., a PC that once had a management session, you can upload the backup using the External File option.
  • Page 69: System > System Log

    3.7. System > System Log The System Log page provides access to the configuration of event logs. 1. Log Level: You can specify what types of event logs to be delivered and preserved. If you select 0 (Emergency), then only the most critical events will be reported. If you select 6 (Informational), then notifications of all severity levels will be reported.
  • Page 70: System > System Log > Syslog Remote

    3.7.1 System > System Log > Syslog Remote You can configure the server to send system logs to a remote server as a log backup. Before using this feature, it is suggested that you install a log-recording tool such as the Kiwi Syslog Daemon from http://www.kiwisyslog.com/kiwi-syslog-daemon-overview/.
  • Page 71: System > Platform Ipmi

    3.8. System > Platform IPMI IPMI stands for Intelligent platform Management Interface. The server has the benefits of self management using a BMC (Baseboard Management Controller) processor, which connects CPU and components on the main board for a better awareness of system operating details, including those for temperature, voltage, fan operation, etc.
  • Page 72: Chapter 4 Storage

    Chapter 4 Storage The Storage windows provides access to the Disks, Volumes, Folder Groups, Logical Disks, and Snapshot backup configuration options. The concerns about RAID storage composition can be found in Appendix A More about RAID Storage on page 156. 4.1.
  • Page 73 The LED on the designated drive tray will light Red. If you have other storage connected to the server, e.g., a JBOD, you can select a different enclosure using the Select Enclosure menu.
  • Page 74 S.M.A.R.T. The second window displays the working status of individual disk drives, including model name, capacity, S.M.A.R.T., state, and temperature. Disk Temperature Monitor Depending on the ambient temperature of your work environment, you can manually specify an upper threshold for all disk drives in your chassis. If the upper threshold is violated, event messages will be delivered to the administrator.
  • Page 75 To perform S.M.A.R.T.-related function, click to select a disk drive entry. Once it is highlighted, the tab menu buttons on top will turn blue. You can click on the Information tab to check on the disk drive's working status in terms of its Read Error, throughput performance, spin up time, reallocated sector, etc.
  • Page 76 You can click on the Test tab to start a test on disk drives according to the S.M.A.R.T. attributes. You may perform Rapid Test or Complete Test to acquire the current integrity status. The test utility then polls the hard drives for statuses of the key attributes of its working conditions.
  • Page 77 To avoid interruptions to daily services, S.M.A.R.T. test can be scheduled to take place in the off-office hours. For example, you can use the Schedule tool to perform such tests on Sundays. Click on the Schedule tab to start the configuration window. Select the Enable checkbox, and configure the time the S.M.A.R.T.
  • Page 78: Storage > Volumes

    4.2. Storage > Volumes Below is a conceptual drawing showing the physical and the logical elements for sharing storage space to a variety of users/computers. The foundation of the configuration starts from the storage volume that provides fault tolerance, disk capacity, and the combined performance from multiple hard drives.
  • Page 79: Volumes

    4.2.1 Volumes The Storage > Volumes page provides configuration and maintenance for logical volumes that consist of multiple disk drives. Logical volumes provide joint performance and fault tolerance in the event of single or dual disk drive failures. To create a logical volume, 1.
  • Page 80 3. Select a Disk Group type from its pull-down menu. Logical volumes can be shared for users with security control. Below is a summary of volume group types: RAID 0 RAID level 0 is disk striping only, which distribute data evenly over multiple disks for better performance.
  • Page 81 4. Select disk members from the disk drives listed below. The configuration process will be completed almost instantly. Once created, the volume's information will be listed, including the volume Name, Total capacity (GB), Used capacity, Free capacity, used Capacity, and Health. The Action button, , lights the disk activity LED of all member drives for identifying the locations of disk members in a chassis.
  • Page 82 Import: A logical volume exported from another server can be brought online using this command. Once it is successfully imported, the volume will be ready for I/Os. You should enter the volume name. All directories and device paths are searched. If the device appears to be part of an exported pool, this command displays a summary of the volume with the name of the volume, a numeric identifier, as well as the device layout and current health of the device for each device or file.
  • Page 83: Disk Operation

    4.2.2 Disk Operation The Disk Operation page allows you to, 1. Add Disk: Add Disk Group to an existing volume. 2. Replace an existing disk member. 3. Attach a new disk member. 4. Detach a disk member from a volume. 5.
  • Page 84 Replace: To replace an existing member disk with another, click on the Replace button. Select a new disk. Note that an unused drive must be present in your server chassis. Click the Replace button. The unused drive must have a capacity larger than the one to be replaced.
  • Page 85 Detach: NOTE: The Attach functions only apply to RAID0 and RAID1. The disk Detach function only applies to RAID1. They do not apply to RAID-Z1 and RAID-Z2 volumes To detach a member disk drive from an existing RAID1 volume, click on the Detach button in the Disk Groups window.
  • Page 86 The following functions are available for the 12600 series: Add Cache Disk: The 12600 series supports the Cache Disk function. The cache disk function manages buffer memory resources to acquire, manage, and release limited memory resources. Using an SSD disk as the cache memory, with its larger capacity, the buffer memory for the file system can be significantly expanded.
  • Page 87: External Fat/Ntfs

    4.2.3 External FAT/NTFS This window allows access to external devices, such as USB drives, formatted in the Windows FAT and NTFS format. These external devices can be mounted and unmounted using the onscreen functional buttons. You can click on the name entry to directly access the files or folders contained within.
  • Page 88: Storage > Folder Groups

    4.3 Storage > Folder Groups 4.3.1 Folder Groups The Folder Groups created here are generated by the NAS server file system, which provide specialized functions such as folder quota, user's quota, compression, snapshot, and copies. System default privileges will apply to the Folder Groups thus created. You can visit Account >...
  • Page 89 6. Enter a capacity number in Gigabytes as the share Quota. 7. Enter a capacity number in Gigabytes as the Reserved capacity which is actually allocated space claimed from the storage volume. 8. You can click on the Advanced tab to open the advanced option menu. Here you can select to enable the Synchronized option as Standard or Always.
  • Page 90: Storage > Folder Groups > Files & Folders

    The "ZFS directory" tab allows you to directly see the snapshot backups of a folder group in a system-embedded snapshot container. However, when doing so, Windows file manager will have troubles calulating the volume capacity of this folder group. The Permission tab guides you to the Permission configuration window, about who can access the folder group.
  • Page 91: Storage > Folder Groups > Folder Group Options

    4.3.3 Storage > Folder Groups > Folder Group Options You can go to the details of a shared Folder Group using the Edit, Move, Permission, Snapshots, and User Quota tabbed menus. Before you begin any configuration, select a target Folder Group using the Select Target Folder menu.
  • Page 92 2. Move: You can move an existing Folder Group to a different location on the directory hierarchy. 3. Permission: 3-1. Select an existing Folder Group. 3-2. Click on the Permission tab. The system will direct you to the Account > Permission page.
  • Page 93 4. Snapshots: Click on the Snapshots tabbed button will direct you to the Storage > Snapshots window. Please refer to page 97 in the later discussion. Once a snapshot is created, click on an existing snapshot and click the Clone button. You can then clone the snapshot backup to a local Folder Group for data analysis or for the purpose of backup to a different location.
  • Page 94: Storage > Folder Groups > User Quota

    4.3.4 Storage > Folder Groups > User Quota From here, you can create a user quota (designated usable storage use) for a user's leverage. You can create the Add Quota button to open the Users Quota window. Click on the Position pull-down menu to display the Local or domain name (if you already joined the server to one of the Windows AD or NIS domain).
  • Page 95: Storage > Logical Disks

    4.4. Storage > Logical Disks Logical Disks are mainly applied in iSCSI service. Logical Disks also provide special functionality such as data compression, copies, and snapshot backup. By carrying SCSI commands over IP networks, iSCSI is used to facilitate data transfers over intranets and to manage storage over long distances.
  • Page 96 3. Select a Volume from which you want to create a Logical Disk. 4. Enter a description for the Logical Disk, such as "iSCSI target for PC #xx." 5. Enter and/or select a storage space as the Logical Disk Size. 6.
  • Page 97: Storage > Snapshots

    4.5. Storage > Snapshots Snapshots are read-only, point-in-time preservations of a file system or a portion of a volume. Because the server runs on a copy-on-write operating system, snapshots can be taken almost instantaneously. Folder Group Snapshots To create snapshots for a Target Folder Group, select a Folder Group under the major storage volume from its pull-down list.
  • Page 98: Chapter 5 Account

    Chapter 5 Account The Account windows allows you to create local or domain accounts for Windows AD or Unix environments. The windows also provides access to control the permission list and access privileges. 5.1. Account > System The System page provides access to current users' configuration and allows you to create new users, or to delete or edit the current users.
  • Page 99 The Members window allows the administrator to move users among different privilege groups using the various move buttons. You can recruit or disband users from each specific group.
  • Page 100: Account > Windows Ad

    5.2. Account > Windows AD Active Directory (AD) is an implementation of LDAP directory services by Microsoft for use primarily in Windows environments. The AD functions as the provider of central authentication and authorization services for Windows-based computers. In addition, Active Directory supports deploying software and assigning policies on a organizational hierarchy.
  • Page 101 Note some of the environment related requirements: 1. Time (namely, the time server settings) must be accurate between AD server and the NAS server. 2. DNS servers, NetBIOS, and domain values have to match those on the AD server. For example, you should check on System > Network, to ensure the NAS server is joined into same network as the AD server.
  • Page 102 If the NAS server is not present yet in an AD server's database. You can visit Active Directory Users and Computers. Make sure to provide the users of the newly added computer (the NAS server) with full control over it. Home Directory: This designate the home directory for use with Windows domain users.
  • Page 103 Tools The server automatically synchronize with the AD server for its domain information by every 1 hour. You can also click the Start Domain Sync button to manually initiate an immediate synchronization process.
  • Page 104: Account > Unix Nis

    5.3. Account > UNIX NIS NIS (Network Information Services), previously known as Yellow Pages, is communication protocol for UNIX systems, which enables data sharing that is centrally managed. The NAS server can manage NFS cient's mount privileges and allow for UNIX/Linux computers granted by the administrator.
  • Page 105: Account > Permission

    5.4. Account > Permission You can share a specific Folder Group in a volume created in this server with others on the network. When you create a share, assign the permission to a share with the allowed or denied permission.
  • Page 106 To specify a permission setting for a particular Folder Group: 1. Click on the Target Path button to determine the access permission to a target. 2. If you want to share an existing Folder Group under a volume, click the folder target name until you reach the desired directory path.
  • Page 107: Account > Permission > Acls

    5.5. Account > Permission > ACLs The main function of this window is to list the folder for which the ACL feature has been configured. If the default privileges have not be altered, the Folder Groups will not be displayed. If the ACL attributes have been configured, only two directory levels will be displayed.
  • Page 108 Regardless of how you access a data share via FTP, SMB, or AFP protocol, the access privileges will be determined by the ACL privilege settings here. To change a permission for a Folder Group or group: 1. In the Permission Settings column, select the Target Path using the Location window. 2.
  • Page 109: Account > Permission > Effective

    5.6. Account > Permission > Effective This window provides access to the list of effective permissions for particular target path. The target path points to a shared Folder Group within the volume. To check the effective permission, 1. First select a target path from the Directory Find button 2.
  • Page 110 4. You can then enter a name in the Search entry, and then click Search. The accounts having effective access rights to the path will be listed. You then select a user group to narrow down a search. Click Add to display the list of target path the account can access.
  • Page 111: Chapter 6 Service

    Chapter 6 Service The Service windows provides access to the sharing protocols in Status, Windows, Apple, UNIX NFS, FTP, iSCSI Targets, Rsync, and Replication. 6.1. Service > Status The Service > Status page provides access to the sharing conditions of all shares to different file systems over different protocols, iSCSI Targets, and system data Rsync and Replication configurations.
  • Page 112: Service > Windows

    6.2. Service > Windows The NAS server utilizes SMB/CIFS protocol (Server Message Block/Common Internet File System), a protocol used by Microsoft to share files, directories, and devices with the Windows client. Note the following with the workgroup mode and the domain mode: 1.
  • Page 113: Service > Apple

    6.3. Service > Apple You can enable Mac file service to let the NAS server manage a Mac file server (AFP Server). The NAS server supports two kinds of protocols used for Mac OS clients –TCP/IP (Open Transport) and Both AppleTalk and TCP/IP. Also, NAS server provides two kinds of security polices for Macintosh Network AFP client.
  • Page 114: Service > Unix Nfs

    6.4. Service > Unix NFS Click the Enable UNIX/Linux Network (NFS Protocol) checkbox to enable access for NFS clients. Click Apply to save the settings.
  • Page 115: Service > Ftp

    6.5. Service > FTP The NAS server supports File Transfer Protocol (FTP) that allows users to transfer files via the Internet. Configuring FTP data access 1. Click Enable FTP Service checkbox to enable all of the configurable options. 2. Select a suitable FTP port. Usually the FTP port #21 is needless to change. 3.
  • Page 116 Login User's home: if selected, once a user logs in to the FTP server, he/she will enter the designated Folder Group or directory that was specified for his/her access. Connections: Use the number entries to specify how many connections are allowed simultaneously.
  • Page 117: Service > Iscsi Targets

    6.6. Service > iSCSI Targets The iSCSI Target panel present storage shares known as Logical Disks as iSCSI targets to the computer equipped with hardware or software iSCSI initiators. The NAS server's iSCSI storage supports iSCSI initiators that comply with the IETF iSCSI standard (RFC 3720).
  • Page 118 To start the iSCSI initiator, go to Control Panel > System and Security > Administrative Tools. The alternative to run the iSCSI Initiator through that path is to execute it by name. All you need to run is iscsicpl.exe. You can go to Start and in the blank, enter "iscsicpl.exe."...
  • Page 119 When the iSCSI target's IQN (that configured on the NAS server) is shown, click on the Connect button. The Devices (iSCSI target) shown as Disk # should be displayed as "Disk# Port#: Bus # Target#: LUN #". Click OK to proceed.
  • Page 120 Go to Computer Management. Click on Storage > Disk Management. An iSCSI target will appear as an un-initialized disk volume. Right-click to initialize the target volume. When done, the iSCSI target can be used as one of your storage devices.
  • Page 121 Using CHAP Authentication CHAP stands for Challenge Handshake Authentication protocol. With this protocol, networked computers use the encrypted password to authenticate each other remotely. The CHAP security method can be used to build a secure iSCSI network. The server supports one-way or two-way (mutual) CHAP authentication. With two-way CHAP, a separate three-way handshake is initiated between an iSCSI initiator and storage host port.
  • Page 122 To make the secure CHAP connection, enter the same name and password (secret) on your iSCSI initiator setting page on the host computer.
  • Page 123 Targets The Targets page allows you configure individual iSCSI targets and filter out computers that you do not want to have the access. In a network environment where multiple computers reside, you may exclude the access from some computers to an iSCSI target from the access list.
  • Page 124 To create a new iSCSI target, click on the Add button. The Add window will appear. Enter a name, comment, and select a Logical Disk. NOTE: You must create Logical Disks in the Storage > Logical Disks window before you can present an iSCSI target to the network.
  • Page 125 Name Filter You may manually enter the iSCSI IQN name for the host computers that can access a specific iSCSI target. Please refer to your host computers' iSCSI initiator setting for their IQN names. IP Filter You may also specify the access list using the IP address, IPv6 address, or the range of subnet (using the CIDR format) to designate a range of computers within a local network that can access the iSCSI target.
  • Page 126 NOTE: If no Name Filter or IP Filter has been configured, all computers within your network can access the iSCSI target and set up a connection with it.
  • Page 127: Service > Rsync

    6.7. Service > Rsync Rsync is used to keep directories on different servers in sync. The main advantage of Rsync (such as a simple copy) is that it is a efficient algorithm to copy only the files (or the part of the files) that have been changed. Using Rsync together with the Snapshot feature of this server, you can create a fast disk based backup solution with automated versioning.
  • Page 128: Service > Replication

    6.7. Service > Replication Replication can be used as a one-time, or a regular copy from one source system to destination target on another server. It is preferred that both NAS servers must reside in the same local area network. If bandwidth is allowed, the target NAS server can reside across the Internet.
  • Page 129 The Replication service, after the initial full backup, replicates the data changes that take place after the initial replication to the target volume. In this way, only the data changes are moved to the target volume. Users can configure a replication schedule down to an interval as short as 10 minutes.
  • Page 130 The Security Management window allows you to set up encrypted replication code and security key to ensure high security level when replicating data between two systems. Create encrypted key files and settings to share and secure the communications between two counterpart systems.
  • Page 131: Chapter 7 Share

    Chapter 7 Share The Share window displays the currently available Folder Groups that are ready to provide shared storage over the network. 7.1. Share - Adding Shares Once you create a Folder Group within a volume, you can create a share in the Share window by clicking the Add button.
  • Page 132: Share - Edit Or Delete

    7.2. Share - Edit or Delete For a configured share, you can click on its checkbox to highlight your selection, and then click on the Edit button. From here you can edit the share name, the comments, and the file system of the computers which can access this share.
  • Page 133 To delete a share, select the checkbox in front of it, and click the Delete button. The target Folder Group remains intact, only that it is not shared across the network.
  • Page 134: Chapter 8 Backup

    Chapter 8 Backup The Backup window provides you with backup options such as Rsync, Local Copy, and Replication. 8.1. Backup - Rsync Requirements: 1. You must have the Rsync service enabled as described on page 127. 2. You must have a User account that is allowed the access to the directory to be backed 3.
  • Page 135 1. Click on the Add button to display the Rsync configuration window. 2. Select the Local to Remote or the Remote to Local check circle. 3. Enter a Name for the Rsync configuration. Names must be identical on the server and on the client.
  • Page 136: Backup - Local Copy

    8.2. Backup - Local Copy NOTE: In addition to the copy from one Folder Group to anther, the Local Copy can be used to back up data to USB or eSATA devices. However, when backup is completed, please visit Storage > Volume > External FAT/NTFS to unmount the removable devices. This is in case that data inconsistency may occur.
  • Page 137: Backup - Replication

    6. Rsync schedule: 6-1. Immediately: Select this to start the Rsync immediately. 6-2. According to the schedule: Select to Rsync hourly, Daily, Weekly, or according to the Monthly schedule. Each is done by selecting different check circles. 8.3. Backup - Replication Requirements: 1.
  • Page 138 5. The name of the Target Volume should automatically be polled if you enter the correct port number and the authorization code. 6. Replication schedule: 6-1. Immediately: Select this to start the Rsync immediately. 6-2. According to the schedule: Select to replicate data changes from source to target by minutes, or hourly, Daily, Weekly, or according to the Monthly schedule.
  • Page 139 7. When done, you click on the Add button below to complete the configuration of a backup task. 8. You can then wait for several seconds, and click on the configured backup task to see processing status. You can then click on the Start, Edit, Delete, or Stop button to change its parameters.
  • Page 140 4. If you select a Restore task, for example, the Restore menu will appear. 5. Enter the Remote NAS IP, NAS replication task port, Authorization Code, and you must ensure to click on the Query button to reach and list the reachable remote volume. 6.
  • Page 141 Backup - Replication Online Once a replication backup is completed, you can then bring the replicatin online on the target side. The Folder Group will be available for access. NOTE: A. Online operation: Before being brought online, users can only export the replication as a Read-only share, and the existing replication schedule can incrementally back up the succeeding data changes according to a preset schedule.
  • Page 142: Chapter 9 Antivirus

    Chapter 9 Antivirus The built-in ClamAV antivirus software provides protection to virus attack against various types of virus. 9.1. Antivirus > Information This page provides the information showing the current virus code, virus scan work record, and antivirus configuration details.
  • Page 143: Antivirus > Antivirus Tasks

    9.2. Antivirus > Antivirus Tasks This page provides access to manual or scheduled virus scan. Please note the following before proceeding with the anitvirus configuration: NOTE: 1. Your system first first must have a System Volume before you can apply the antivirus function.
  • Page 144 Click on the Refresh Code button to enable the antivirus function. To begin a manual or scheduled scan, 1. Click the Add button. 2. Enter the name for the task. 3. Select from the Scan Path menu and/or the Scan all files option for which part of your volume needs to be scanned (and the sub-directories).
  • Page 145: Antivirus > Virus Scan Record

    To configure the anti-virus-related settings 1. Action when virus found - Quarantine - move infected files to the quarantine folder. - Delete: remove affected files. Please note that even compressed files or folders can be scanned, and the virus can be found.
  • Page 146: Chapter 10 Event

    Chapter 10 Event The Event windows provides access to all system events concerning configuration changes, reminder, System-related, Device-related, Security, and Regular messages. 10.1. Event > Configuration Once you enter the Event window, the system will default to the Reminder screen, instead of the Configuration screen.
  • Page 147: Event > Reminder

    Email Notification The event messages can be delivered through Email. Select from the Notify Events drop- down box which severity level of events will be delivered to the receiver. The severity level can be Info, Warning, or Error. 10.2. Event > Reminder The Reminder events include system critical events such as component failures or major events, e.g., firmware update, mount/unmount volume, system reboot, creation/deletion of folders or logical disks, add/remove disks, volume rebuild, etc.
  • Page 148: Event > System

    10.3. Event > System The System events include system-related events such as component failures, network- related configuration, system on/off, firmware update, reboot, volume configuration, etc. Use the page up and page down button to move to other event pages.
  • Page 149: Event > Device

    10.4. Event > Device The Device events include those for system volumes, hard disks, system start time, USB drive operation, eSATA devices,...
  • Page 150: Event > Security

    10.5. Event > Security The Security events include those for access rights, including domain configuration, login status, domain information synchronization, user's permission succeed/failure, etc.
  • Page 151 10.6. Event > Regular The Regular events mostly include those for system maintenance schedule such as scheduled tasks such as snapshot and Rsync.
  • Page 152: Chapter 11 Status

    Chapter 11 Status The Status windows provides a glimpse of hardware, access to network shares, connections, scheduled task progress, and system loading. 11.1. Hardware All important system operating statuses are listed here. Their statuses indicated by green or red indicators. CPU thermal, power input, and fan rotation speed are automatically detected and reported in here.
  • Page 153: Status > Opened Files

    11.2. Status > Opened Files This window shows the files in shares that are currently being accessed. 11.3. Status > Connections This window shows the computers which are currently accessing the shares via SMB, AFP, FTP, HTTP, or iSCSI protocol. You can use the protocol type, such as keying AFP, to search for the computers that are currently having an access with the NAS server.
  • Page 154: Status > Task Progress

    11.4. Status > Task Progress This window shows the tasks currently taking place on your server. For example, the volume sync/Rsync, replication, volume scanning, or the account permission settings with a Windows AD server will be displayed in here.
  • Page 155: Status > Loading

    11.5. Status > Loading This window shows the visualized display for the consumption of system resources. The loading status include Memory Usage, CPU Summary, Network Summary, and Disk Summary. For the 12600 series, warning messages will be sent when the system operaing temperature reaches 43º.
  • Page 156: Appendix A More About Raid Storage

    Appendix A More about RAID Storage 1. Volume Expansion: In addition to volumes made of striping, mirroring, RAID-Z1/Z2, several volumes can be combined into a larger volume pool. The combinations can be: 1-1. Mirror + Mirror +...: similar to traditional RAID10. 1-2.
  • Page 157 4. Disk Roaming from 4600U/T to 12600U rack-mount models: 4-1. Power down the 4600U/T system. 4-2. Remove all member drives belonging to a logical volume. Re-install them to the drive trays of the 12600U series systems. 4-3. Install these member drives to the 12600U system. 4-4.

This manual is also suitable for:

Nastorage 12620 seriesNastorage 12600 series

Table of Contents