Typical Setup Procedure; Step 1: Network Setup; Step 2: Raid Creation; Step 3: Create Local Users Or Setup Authentication - Thecus M3800 User Manual

Ip storage appliance
Table of Contents

Advertisement

Typical Setup Procedure

From the Web Administration Interface, you can begin to setup your M3800 for
se on your network. Setting up the M3800 typically follows the five steps
u
outlined below.
For more on how to use the Web Administration Interface, see Chapter 4:
System Management >

Step 1: Network Setup

From
the Web Administration Interface, you can configure the network settings of
th
e M3800 for your network. You can access the Network menu from the menu
bar.
For details on how to configure your network settings, refer to Chapter 4:
System Management >

Step 2: RAID Creation

Next, administrators can configure their preferred RAID settin
R
AID volume. You can access RAID settings from the menu bar of the Web
Administration Interface by navigating to Storage > RAID.
F
or more information on configuring RAID, see Chapter 4: System
Management >
RAID
Don't know which RAID level to use? Find out more about the different RAID
levels from
Appendix C: RAID

Step 3: Create Local Users or Setup Authentication

O
nce the RAID is ready, you can begin to create local users for the M3800, or
choose to setup authentication protocols such as Active Directory (AD).
F
or more on managing users, go to Chapter 4: System Management >
and Group
Management.
F
or more information on configuring Active Directory, see Chapter 4: System
Management > User and Group Management >
For information about the benefits of Active Directory, see
Directory
Basics.

Step 4: Create Folders and Set Up ACLs

Once u
sers are introduced into your network, you can begin to create various
fo
lders on the M3800 and control user access to each using Folder Access Control
Lists.
M
ore information on managing folders, see Chapter 4: System Management >
Folder
Management.
To find out about configuring Folder Access Control Lists, see Chapter 4: System
Management > Folder Management >
Web Administration
Network
Management.
Configuration.
Basics.
Folder Access Control List
19
Interface.
g and build their
ADS/NT
Configuration.
Appendix D: Active
User
(ACL).

Advertisement

Table of Contents
loading

Table of Contents