Typical Setup Procedure
From the Web Administration Interface, you can begin to setup your M3800 for
se on your network. Setting up the M3800 typically follows the five steps
u
outlined below.
For more on how to use the Web Administration Interface, see Chapter 4:
System Management >
Step 1: Network Setup
From
the Web Administration Interface, you can configure the network settings of
th
e M3800 for your network. You can access the Network menu from the menu
bar.
For details on how to configure your network settings, refer to Chapter 4:
System Management >
Step 2: RAID Creation
Next, administrators can configure their preferred RAID settin
R
AID volume. You can access RAID settings from the menu bar of the Web
Administration Interface by navigating to Storage > RAID.
F
or more information on configuring RAID, see Chapter 4: System
Management >
RAID
Don't know which RAID level to use? Find out more about the different RAID
levels from
Appendix C: RAID
Step 3: Create Local Users or Setup Authentication
O
nce the RAID is ready, you can begin to create local users for the M3800, or
choose to setup authentication protocols such as Active Directory (AD).
F
or more on managing users, go to Chapter 4: System Management >
and Group
Management.
F
or more information on configuring Active Directory, see Chapter 4: System
Management > User and Group Management >
For information about the benefits of Active Directory, see
Directory
Basics.
Step 4: Create Folders and Set Up ACLs
Once u
sers are introduced into your network, you can begin to create various
fo
lders on the M3800 and control user access to each using Folder Access Control
Lists.
M
ore information on managing folders, see Chapter 4: System Management >
Folder
Management.
To find out about configuring Folder Access Control Lists, see Chapter 4: System
Management > Folder Management >
Web Administration
Network
Management.
Configuration.
Basics.
Folder Access Control List
19
Interface.
g and build their
ADS/NT
Configuration.
Appendix D: Active
User
(ACL).