D-Link DSN-6120 User Manual

D-Link DSN-6120 User Manual

Dsn-6100 series d-link iscsi ip san storage
Table of Contents

Advertisement

D-Link iSCSI IP SAN storage
GbE iSCSI to SATA II / SAS
RAID IP SAN storage
DSN-6110 & DSN-6120
User Manual
Version 1.0
1

Advertisement

Table of Contents
loading

Summary of Contents for D-Link DSN-6120

  • Page 1 D-Link iSCSI IP SAN storage GbE iSCSI to SATA II / SAS RAID IP SAN storage DSN-6110 & DSN-6120 User Manual Version 1.0...
  • Page 2: About This Manual

    About this manual This manual is the introduction of D-Link DSN-61x0 IP SAN storage and it aims to help users know the operations of the disk array system easily. Information contained in this manual has been reviewed for accuracy, but not for product warranty because of the various environments / OS / settings.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1 Overview ............6     Features ..................6     1.1.1 Highlights .........................7     RAID concepts ................8     1.2.1 Terminology ......................8     1.2.2 RAID levels......................10     1.2.3 Volume relationship....................11     iSCSI concepts ................11  ...
  • Page 4   5.7.2 Upgrade firmware of JBOD ..................97     MPIO and MC/S ................98     Trunking and LACP ..............100     5.10 Dual controllers (only for DSN-6120).........101     5.10.1 Perform I/O......................101     5.10.2 Ownership......................102     5.10.3 Controller status....................103  ...
  • Page 5 Event notifications ..............117     Certification list ................123     Microsoft iSCSI initiator..............126     From single controller to Dual controller …………………………… 132...
  • Page 6: Chapter 1 Overview

    Chapter 1 Overview 1.1 Features D-Link DSN-6000 series IP SAN storage provides non-stop service with a high degree of fault tolerance by using D-Link RAID technology and advanced array management features. DSN-6110/6120 IP SAN storage connects to the host system by iSCSI interface. It can be configured to numerous RAID level.
  • Page 7: Highlights

    1.1.1 Highlights D-Link DSN-6110/6120 feature highlights  Host 8 x iSCSI GbE ports (DSN-6120) Interface 4 x iSCSI GbE ports (DSN-6110) Drive 12 x SAS or SATA II Interface RAID Single controller, can be upgradable to dual (DSN-6110) Controllers Dual-active RAID controllers (DSN-6120)
  • Page 8: Raid Concepts

    1.2 RAID concepts RAID is the abbreviation of “Redundant Array of Independent Disks”. The basic idea of RAID is to combine multiple drives together to form one large logical drive. This RAID drive obtains performance, capacity and reliability than a single drive. The operating system detects the RAID drive as a single storage device.
  • Page 9 both data cache and accessed physical disks. Write-Back cache-write policy. A caching technique in which the completion of a write request is signaled as soon as the data is in cache and actual writing to non-volatile media occurs at a later time.
  • Page 10: Raid Levels

    MPIO Multi-Path Input/Output. MC/S Multiple Connections per Session Maximum Transmission Unit. Challenge Handshake Authentication Protocol. An optional CHAP security mechanism to control access to an iSCSI storage system over the iSCSI data ports. iSNS Internet Storage Name Service. Part 3: Dual controller ...
  • Page 11: Volume Relationship

    Striping over the member RAID 3 volumes. RAID 30 needs at RAID 30 least six hard drives. Striping over the member RAID 5 volumes. RAID 50 needs at RAID 50 least six hard drives. Striping over the member RAID 6 volumes. RAID 60 needs at RAID 60 least eight hard drives.
  • Page 12 IP SANs are true SANs (Storage Area Networks) which allow several servers to attach to an infinite number of storage volumes by using iSCSI over TCP/IP networks. IP SANs can scale the storage capacity with any type and brand of storage system. In addition, it can be used by any type of network (Ethernet, Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet) and combination of operating systems (Microsoft Windows, Linux, Solaris, Mac, etc.) within the SAN network.
  • Page 13: Ip San Storage Specifications

    The management port can be transferred smoothly to the other controller with  the same IP address Online firmware upgrade, no system down time (only for DSN-6120) Multiple target iSCSI nodes per controller support Each LUN can be attached to one of 32 nodes from each controller...
  • Page 14 Instant RAID volume availability 10. Auto volume rebuilding 11. On-line volume migration with no system down-time Advanced data protection  D-Link writeable snapshot Built-in snapshot with rollback enabled  Snapshot enabled up to 16 volumes, each logical volume supports up to 32 ...
  • Page 15 Up to 32 multiple nodes support VLAN support Host connection  4x GbE ports (DSN-6110)/ 8 x GbE ports (DSN-6120) Host access control: Read-Write and Read-Only Up to 128 sessions One logic volume can be shared by as many as 16 hosts OS support ...
  • Page 16: Fcc And Ce Statements

    Drive support  SATA II (optional, need SATA Bridge board) SCSI-3 compliant Multiple IO transaction processing Tagged command queuing Disk auto spin-down support S.M.A.R.T. for SATA II drives SAS JBODs expansion Power and Environment  AC input: 100-240V ~ 7A-4A 500W with PFC (Auto Switching) ...
  • Page 17 Elevated Operating Ambient - If installed in a closed or multi-unit rack assembly, the operating ambient temperature of the rack environment may be greater than room ambient. Therefore, consideration should be given to installing the equipment in an environment compatible with the maximum ambient temperature (Tma) specified by the manufacturer.
  • Page 18: Chapter 2 Installation

    Chapter 2 Installation 2.1 Package contents The package contains the following items: DSN-6110/6120 IP SAN storage (x1) HDD trays (x12) Power cords (x4) RS-232 cables (x2), one is for console, the other is for UPS. CD (x1) Rail kit (x1 set) Keys, screws for drives and rail kit (x1 packet) 2.2 Before installation Before starting, prepare the following items.
  • Page 19: Front Led Lights

    The drives can be installed into any slot in the enclosure. Slot numbering will be reflected in web UI. Tips It is advisable to install at least one drive in slots 1 ~ 4. System event logs are saved to drives in these slots; If no drives are fitted the event logs will be lost in the event of a system reboot.
  • Page 20: Install Drives

    2.3.3 Install drives Note : Skip this section if you purchased a solution populated with drives. To install SAS or SATA drives with no Bridge Board use the front mounting holes: To install SATA drives with Bridge Board (DSN-654), fit the Bridge Board first Then install the drive using the rear mounting holes:...
  • Page 21: Rear View

    Blue blinking  HDD is accessing.  Off  No HDD.   HDD tray handhold.  Latch for tray kit removal. 2.3.4 Rear view       Figure 2.3.4.1 (DSN-6120) PSU and Fan module description:   Controller 2.
  • Page 22  Controller 1.  Power supply unit (PSU2).  Fan module (FAN3 / FAN4).  Power supply unit (PSU1).  Fan module (FAN1 / FAN2).      Figure 2.3.4.2 (DSN-6110) PSU and Fan module description:   Controller.
  • Page 23: Install Battery Backup Module

    LED (from left to right) Controller Health LED: Green  Controller status normal or in the booting.  Red  Other than above status.  Master Slave LED: (only for DSN-6120) Green  Master controller.  Off  Slave controller.  Dirty Cache LED: Orange ...
  • Page 24 Shutdown IP SAN storage, then power off. Remove the cover of battery backup module. Insert the battery backup module. Figure 2.4.1 Tighten the screws up. Power on, BBM will work. Figure 2.4.2...
  • Page 25: Deployment

    2.5 Deployment Please refer to the following topology and have all the connections ready. Figure 2.5.1 (DSN-6120) Figure 2.5.2 (DSN-6110) Setup the hardware connection before power on servers. Connect console cable, management port cable, and iSCSI data port cables in advance.
  • Page 26 Host server is suggested to logon the target twice (both controller 1 and controller 2), and then MPIO should be setup automatically. (only for DSN-6120) Tips iSNS server is recommended for dual controller system. For better data service availability, all the connections among host servers, GbE switches, and the dual controllers are recommended as redundant as below.
  • Page 27: Chapter 3 Quick Setup

    3.1.1 Serial console Use console cable (NULL modem cable) to connect from console port of D-Link IP SAN storage to RS 232 port of management PC. Please refer to figure 2.3.1. The console settings are on the following: Baud rate: 115200, 8 data bit, no parity, 1 stop bit, and no flow control.
  • Page 28 Figure 3.1.4.1 User name: admin Default password: 123456 After login, choose the functions which lists on the left side of window to make any configuration. Figure 3.1.4.2 There are seven indicators and three icons at the top-right corner. Figure 3.1.4.3 Indicator description: ...
  • Page 29 Temperature light: Green  Temperature is normal.  Red  Temperature is abnormal.  Voltage light: Green  voltage is normal.  Red  voltage is abnormal.  UPS light: Green  UPS works well.  Red  UPS fails. ...
  • Page 30: How To Use The System Quickly

    3.2 How to use the system quickly The following methods will describe the quick guide to use this IP SAN storage. 3.2.1 Quick installation Please make sure that there are some free drives installed in this system. SAS drives are recommended.
  • Page 31 Step2: Confirm the management port IP address and DNS, and then click “Next”. Figure 3.2.1.3 Step 3: Set up the data port IP and click “Next”. Figure 3.2.1.4 Step 4: Set up the RAID level and volume size and click “Next”.
  • Page 32: Volume Creation Wizard

    Figure 3.2.1.5 Step 5: Check all items, and click “Finish”. Figure 3.2.1.6 3.2.2 Volume creation wizard “Volume create wizard” has a smarter policy. When the system is inserted with some HDDs. “Volume create wizard” lists all possibilities and sizes in different RAID levels, it will use all available HDDs for RAID level depends on which user chooses.
  • Page 33 different sizes of HDDs, e.g., 8*200G and 8*80G, it lists all possibilities and combination in different RAID level and different sizes. After user chooses RAID level, user may find that some HDDs are available (free status). The result is using smarter policy designed by D- Link.
  • Page 34 Figure 3.2.2.2 Step 3: Decide VD size. User can enter a number less or equal to the default number. Then click “Next”. Figure 3.2.2.3 Step 4: Confirmation page. Click “Finish” if all setups are correct. Then a VD will be created.
  • Page 35: Chapter 4 Configuration

    Chapter 4 Configuration 4.1 Web UI management interface hierarchy The below table is the hierarchy of web GUI. System configuration System setting  System name / Date and time / System indication Network settin  MAC address / Address / DNS / Port Login setting ...
  • Page 36: System Configuration

    Upgrade  Browse the firmware to upgrade Firmware synch  Synchronize the slave controller’s firmware version with the master’s ronization Reset to factory  Sure to reset to factory default? default Import and Import/Export / Import file export Reboot and shu ...
  • Page 37: Network Setting

    Check “Change date and time” to set up the current date, time, and time zone before using or synchronize time from NTP (Network Time Protocol) server. Click “Confirm” in System indication to turn on the system indication LED. Click again to turn off. 4.2.2 Network setting “Network setting”...
  • Page 38: Mail Setting

    Figure 4.2.3.1 Check “Change admin password” or “Change user password” to change admin or user password. The maximum length of password is 12 characters. 4.2.4 Mail setting “Mail setting” can enter 3 mail addresses for receiving the event notification. Some mail servers would check “Mail-from address”...
  • Page 39: Notification Setting

    Figure 4.2.4.1 4.2.5 Notification setting “Notification setting” can set up SNMP trap for alerting via SNMP, pop-up message via Windows messenger (not MSN), alert via syslog protocol, and event log filter for web UI.
  • Page 40 Figure 4.2.5.1 “SNMP” allows up to 3 SNMP trap addresses. Default community setting is “public”. User can choose the event log levels and default setting enables ERROR and WARNING event log in SNMP. There are many SNMP tools. The following web sites are for your reference: SNMPc: http://www.snmpc.com/ Net-SNMP:...
  • Page 41: Iscsi Configuration

    Most UNIX systems build in syslog daemon. “Event log filter” setting can enable event log display on “Pop up events”. 4.3 iSCSI configuration “iSCSI configuration” is designed for setting up the “Entity Property”, “NIC”, “Node”, “Session”, and “CHAP account”. Figure 4.3.1 4.3.1 “NIC”...
  • Page 42 Figure 4.3.1.2 Default gateway:  Default gateway can be changed by checking the gray button of LAN port, click “Become default gateway”. There can be only one default gateway. MTU / Jumbo frame:  MTU (Maximum Transmission Unit) size can be enabled by checking the gray button of LAN port, click “Enable jumbo frame”.
  • Page 43 LACP packets to the peer. The advantages of LACP are (1) increases the bandwidth. (2) failover when link status fails on a port. Trunking / LACP setting can be changed by clicking the button “Aggregation”. Figure 4.3.1.3 (Figure 4.3.1.3: There are 4 iSCSI data ports on each controller, select at least two NICs for link aggregation.) Figure 4.3.1.4 For example, LAN1 and LAN2 are set as Trunking mode.
  • Page 44: Entity Property

    Figure 4.3.1.5 (Figure 4.3.1.5 shows a user can ping host from the target to make sure the data port connection is well.) 4.3.2 Entity property “Entity property” can view the entity name of the system, and setup “iSNS IP” for iSNS (Internet Storage Name Service).
  • Page 45 Figure 4.3.3.1 CHAP:  CHAP is the abbreviation of Challenge Handshake Authentication Protocol. CHAP is a strong authentication method used in point-to-point for user login. It’s a type of authentication in which the authentication server sends the client a key to be used for encrypting the username and password.
  • Page 46 Figure 4.3.3.3 Go to “/ iSCSI configuration / CHAP account” page to create CHAP account. Please refer to next section for more detail. Check the gray button of “OP.” column, click “User”. Select CHAP user(s) which will be used. It’s a multi option; it can be one or more. If choosing none, CHAP can not work.
  • Page 47: Session

    Rename alias:  User can create an alias to one device node. Check the gray button of “OP.” column next to one device node. Select “Rename alias”. Create an alias for that device node. Click “OK” to confirm. An alias appears at the end of that device node. Figure 4.3.3.6 Figure 4.3.3.7 Tips...
  • Page 48: Chap Account

    Figure 4.3.4.1 (iSCSI Session) Check the gray button of session number, click “List connection”. It can list all connection(s) of the session. Figure 4.3.4.2 (iSCSI Connection) 4.3.5 CHAP account “CHAP account” can manage a CHAP account for authentication. DSN-6110/6120 can create multiple CHAP accounts.
  • Page 49: Volume Configuration

    Click “OK”. Figure 4.3.5.2 Click “Delete” to delete CHAP account. 4.4 Volume configuration “Volume configuration” is designed for setting up the volume configuration which includes “Physical disk”, “RAID group”, “Virtual disk”, “Snapshot”, “Logical unit”, and “Replication” (optional). Figure 4.4.1 4.4.1 Physical disk “Physical disk”...
  • Page 50 Figure 4.4.1.1 Step 2: If there is any RG which is in protected RAID level and can be set with dedicate spare disk, select one RG, and then click “Submit”. Figure 4.4.1.2 Step 3: Done. View “Physical disk” page. Figure 4.4.1.3 (Figure 4.4.1.3: Physical disks in slot 1,2,3 are created for a RG named “RG-R5”.
  • Page 51 Figure 4.4.1.4 PD column description:  Slot The position of a hard drive. The button next to the number of slot shows the functions which can be executed. Size (GB) Capacity of hard drive. The unit can be displayed in GB or MB. (MB) RG Name RAID group name.
  • Page 52 RAID group. “Free disk”  This hard drive is free for use.  “Dedicated spare”  This hard drive has been set as  dedicated spare of a RG. “Global spare”  This hard drive has been set as  global spare of all RGs.
  • Page 53: Raid Group

    off. indication More Show hard drive detail information. information 4.4.2 RAID group “RAID group” can view the status of each RAID group, create, and modify RAID groups. The following is an example to create a RG. Step 1: Click “Create”, enter “Name”, choose “RAID level”, click “Select PD” to select PD, assign the RG’s “Preferred owner”.
  • Page 54 Figure 4.4.2.2 (Figure 4.4.2.2: There is a RAID 0 with 4 physical disks, named “RG-R0”. The second RAID group is a RAID 5 with 3 physical disks, named “RG-R5”.) Step 3: Done. View “RAID group” page. RG column description:  The button includes the functions which can be executed.
  • Page 55 “Failed”  the RAID group fails.  “Degraded”  the RAID group is not healthy and not  completed. The reason could be lack of disk(s) or have failed disk RAID The RAID level of the RAID group. Current The owner of the RAID group. The default owner is controller 1. owner Preferred The preferred owner of the RAID group.
  • Page 56: Virtual Disk

    Command queuing: “Enabled”  Enable disk command queue. (Default) “Disabled”  Disable disk command queue. More Show RAID group detail information. information 4.4.3 Virtual disk “Virtual disk” can view the status of each Virtual disk, create, and modify virtual disks. The following is an example to create a VD.
  • Page 57 Step 2: Confirm page. Click “OK” if all setups are correct. Figure 4.4.3.2 (Figure 4.4.3.2: Create a VD named “VD-01”, from “RG-R0”.) Step 3: Done. View “Virtual disk” page. VD column description:  The button includes the functions which can be executed. Name Virtual disk name.
  • Page 58 number the background priority of a VD is, the more background I/O will be scheduled to execute. Status The status of virtual disk: “Online”  The virtual disk is online.  “Offline”  The virtual disk is offline.  “Initiating”  The virtual disk is being initialized. ...
  • Page 59 The unit can be displayed in GB or MB. #Snapshot Number of snapshot(s) that have been taken. RG name The RG name of the virtual disk VD operation description:  Create Create a virtual disk. Extend Extend the virtual disk capacity. Parity check Execute parity check for the virtual disk.
  • Page 60 editing. “Disabled”  Disable AV-media mode. (Default)  Type: “RAID”  the virtual disk is normal. (Default)  “Backup”  the virtual disk is for clone usage.  Attach LUN Attach to a LUN. Detach LUN Detach to a LUN. List LUN List attached LUN(s).
  • Page 61: Snapshot

    4.4.4 Snapshot “Snapshot” can view the status of snapshot, create, and modify snapshots. Please refer to next chapter for more detail about snapshot concept. The following is an example to take a snapshot. Step 1: Create snapshot space. In “/ Volume configuration / Virtual disk”, Check to the gray button next to the VD number;...
  • Page 62 Figure 4.4.4.4 Figure 4.4.4.5 (Figure 4.4.4.5: This is the snapshot list of “VD-01”. There are two snapshots. Snapshot VD “SnapVD-01” is exposed as read-only, “SnapVD-02” is exposed as read-write.) Step 5: Attach a LUN to a snapshot VD. Please refer to the next section for attaching a LUN.
  • Page 63: Logical Unit

    “Good”  The snapshot is good.  “Failed”  The snapshot fails.  Exposure Snapshot VD is exposed or not. Right The right of snapshot: “Read-write”  The snapshot VD can be read / write.  “Read-only”  The snapshot VD is read only. ...
  • Page 64 Figure 4.4.5.1 Figure 4.4.5.2 LUN operation description:  Attach Attach a logical unit number to a virtual disk. Detach Detach a logical unit number from a virtual disk. The matching rules of access control are followed from the LUN’ created time; the earlier created LUN is prior to the matching rules.
  • Page 65: Example

    4.4.6 Example The following is an example to create volumes. This example is to create two VDs and set a global spare disk. Example  This example is to create two VDs in one RG, each VD shares the cache volume. The cache volume is created after system boots up automatically.
  • Page 66 Step 2: Create VD (Virtual Disk). To create a data user volume, please follow the procedures. Figure 4.4.6.3 Select “/ Volume configuration / Virtual disk”. Click “Create”. Input a VD name, choose a RG Name and enter a size for this VD; decide the stripe height, block size, read / write mode, bg rate, and set priority, finally click “OK”.
  • Page 67 In “/ Volume configuration / Logical unit”, click “Attach”. The procedures are as follows: Figure 4.4.6.5 Select a VD. Input “Host” IQN, which is an iSCSI node name for access control, or fill-in wildcard “*”, which means every host can access to this volume. Choose LUN and permission, and then click “OK”.
  • Page 68 Figure 4.4.6.7 (Figure 4.4.6.7: Slot 4 is set as a global spare disk.) Step 5: Done. Delete VDs, RG, please follow the below steps. Step 6: Detach a LUN from the VD. In “/ Volume configuration / Logical unit”, Figure 4.4.6.8 Check the gray button next to the LUN;...
  • Page 69: Enclosure Management

    Step 8: Delete a RG (RAID group). To delete a RAID group, please follow the procedures: Select “/ Volume configuration / RAID group”. Select a RG which all its VD are deleted, otherwise the this RG cannot be deleted. Check the gray button next to the RG number click “Delete”. There will pop up a confirmation page, click “OK”.
  • Page 70: Hardware Monitor

    4.5.1 Hardware monitor “Hardware monitor” can view the information of current voltages and temperatures.
  • Page 71: Ups

    Figure 4.5.1.1 If “Auto shutdown” is checked, the system will shutdown automatically when voltage or temperature is out of the normal range. For better data protection, please check “Auto Shutdown”. For better protection and avoiding single short period of high temperature triggering auto shutdown, the system use multiple condition judgments to trigger auto shutdown, below are the details of when the Auto shutdown will be triggered.
  • Page 72 First, connect the system and APC UPS via RS-232 for communication. Then set up the shutdown values (shutdown battery level %) when power is failed. UPS in other companies can work well, but they have no such communication feature with the system. Figure 4.5.2.2 (Figure 4.5.2.2: With Smart-UPS.) UPS column description:...
  • Page 73: Ses

    “UPS shutdown in progress”  “Batteries failed. Please change them NOW!”  Battery Current power percentage of battery level. Level (%) 4.5.3 SES represents SCSI Enclosure Services, one of the enclosure management standards. “SES configuration” can enable or disable the management of SES. Figure 4.5.3.1 (Figure 4.5.1.1: Enable SES in LUN 0, and can be accessed from every host) The SES client software is available at the following web site:...
  • Page 74: System Maintenance

    S.M.A.R.T. only supports SATA drives. SAS drives do not have this function now. It will show N/A in the web page for SAS drives. Figure 4.5.4.1 (SAS drives & SATA drives) 4.6 System maintenance “Maintenance” allows the operations of system functions which include “System information”...
  • Page 75: Event Log

    Status description:  Normal Dual controllers are in normal stage. Degraded One controller fails or has been plugged out. Lockdown The firmware of two controllers is different or the size of memory of two controllers is different. Single Single controller mode. 4.6.2 Event log “Event log”...
  • Page 76 Figure 4.6.2.1 The event log is displayed in reverse order which means the latest event log is on the first / top page. The event logs are actually saved in the first four hard drives; each hard drive has one copy of event log. For one system, there are four copies of event logs to make sure users can check event log any time when there are failed disks.
  • Page 77: Upgrade

    4.6.3 Upgrade “Upgrade” can upgrade firmware. Please prepare new firmware file named “xxxx.bin” in local hard drive, then click “Browse” to select the file. Click “Confirm”, it will pop up a message “Upgrade system now? If you want to downgrade to the previous FW later (not recommend), please export your system configuration in advance”, click “Cancel”...
  • Page 78: Reset To Factory Default

    4.6.5 Reset to factory default “Reset to factory default” allows user to reset IP SAN storage to factory default setting. Figure 4.6.5.1 Reset to default value, the password is: 1234, and IP address to default 192.168.0.32 4.6.6 Import and export “Import and export”...
  • Page 79: Reboot And Shutdown

    4.6.7 Reboot and shutdown “Reboot and shutdown” can “Reboot” and “Shutdown” the system. Before power off, it’s better to execute “Shutdown” to flush the data from cache to physical disks. The step is necessary for data protection. Figure 4.6.7.1 4.7 Home/Logout/Mute In the right-upper corner of web UI, there are 3 individual icons, “Home”, “Logout”, and “Mute”.
  • Page 80: Chapter 5 Advanced Operations

    But rebuilding in the same failed disk may impact customer data if the status of disk is unstable. D-LINK suggests all customers not to rebuild in the failed disk for better data protection.
  • Page 81 Rebuild operation description:  RAID 0 Disk striping. No protection for data. RG fails if any hard drive fails or unplugs. RAID 1 Disk mirroring over 2 disks. RAID 1 allows one hard drive fails or unplugging. Need one new hard drive to insert to the system and rebuild to be completed.
  • Page 82: Rg Migration

    5.2 RG migration To migrate the RAID level, please follow below procedures. Select “/ Volume configuration / RAID group”. Check the gray button next to the RG number; click “Migrate”. Change the RAID level by clicking the down arrow to “RAID 5”. There will be a pup- up which indicates that HDD is not enough to support the new setting of RAID level, click “Select PD”...
  • Page 83: Vd Extension

    To do migration, the total size of RG must be larger or equal to the original RG. It does not allow expanding the same RAID level with the same hard disks of original RG. The below operations are not allowed when a RG is being migrated. System would reject these operations: Add dedicated spare.
  • Page 84: Snapshot

    Figure 5.3.2 Tips The size of VD extension must be larger than original. Caution VD Extension cannot be executed during rebuilding or migration. 5.4 Snapshot Snapshot-on-the-box captures the instant state of data in the target volume in a logical sense. The underlying logic is Copy-on-Write -- moving out the data which would be written to certain location where a write action occurs since the time of data capture.
  • Page 85: Create Snapshot Volume

    5.4.1 Create snapshot volume To take a snapshot of the data, please follow the procedures. Select “/ Volume configuration / Virtual disk”. Check the gray button next to the VD number; click “Set snapshot space”. Set up the size for snapshot. The minimum size is suggested to be 20% of VD size, and then click “OK”.
  • Page 86: Auto Snapshot

    There are two methods to clean all snapshots. In “/ Volume configuration / Virtual disk”, check the gray button next to the VD number; click “Cleanup snapshot”. Or in “/ Volume configuration / Snapshot”, click “Cleanup”. “Cleanup snapshot” will delete all snapshots of the VD and release snapshot space. 5.4.2 Auto snapshot The snapshot copies can be taken manually or by schedule such as hourly or daily.
  • Page 87: Rollback

    5.4.4 Snapshot constraint D-LINK snapshot function applies Copy-on-Write technique on UDV/VD and provides a quick and efficient backup methodology. When taking a snapshot, it does not copy any data at first time until a request of data modification comes in. The snapshot copies the original data to snapshot space and then overwrites the original data with new changes.
  • Page 88 Figure 5.4.4.1 On Linux and UNIX platform, a command named sync can be used to make the operating system flush data from write caching into disk. For Windows platform, Microsoft also provides a tool – sync, which can do exactly the same thing as the sync command in Linux/UNIX.
  • Page 89: Disk Roaming

    For example, there are two or more snapshots existed on a VD and the latest snapshot keeps growing. When it comes to the moment that the snapshot space is run out, the system will try to remove the oldest snapshot to release more space for the latest snapshot usage.
  • Page 90: Vd Clone

    5.6 VD clone The user can use VD clone function to backup data from source VD to target VD, set up backup schedule, and deploy the clone rules. The procedures of VD clone are on the following: 1. Copy all data from source VD to target VD at the beginning (full copy). 2.
  • Page 91 Here are the objects, a Source VD and a Target VD. Before starting clone process, it needs to deploy the VD Clone rule first. Click “Configuration”. Figure 5.6.3 There are three clone configurations, describe on the following. Figure 5.6.4 Snapshot space: ...
  • Page 92 Figure 5.6.5 The threshold setting will monitor the usage amount of snapshot space. When the used snapshot space achieves its threshold, system will automatically take a clone snapshot and start VD clone process. The purpose of threshold could prevent the incremental copy fail immediately when running out of snapshot space.
  • Page 93 Figure 5.6.7 Select the target VD. Then click “Confirm”. Figure 5.6.8 Now, the clone target “TargetVD_R6” has been set. Figure 5.6.9 Click “Start clone”, the clone process will start.
  • Page 94 Figure 5.6.10 The default setting will create a snapshot space automatically which the capacity is double size of the VD space. Before starting clone, system will initiate the snapshot space. Figure 5.6.11 10. After initiating the snapshot space, it will start cloning. Figure 5.6.12 11.
  • Page 95 Figure 5.6.13 12. There are “Set Clone schedule” and “Clear Clone schedule” in this page. Please remember that “Threshold” and “Restart the task an hour later if failed” options in VD configuration will take effect after clone schedule has been set. Figure 5.6.14 Run out of snapshot space while VD clone ...
  • Page 96 the clone process. Each time the clone snapshot failed, it means that the system loses the reference value of incremental data. So it will start a full copy at next clone process. When running out of snapshot space, the flow diagram of VD clone procedure will be like the following.
  • Page 97: Sas Jbod Expansion

    The following table is the maximum JBOD numbers and maximum HDD numbers with different chassises can be cascaded. Dual controllers + RAID Storage System Dual JBOD DSN-6120 DSN-6020 no. Max HDD no. 5.7.2 Upgrade firmware of JBOD To upgrade the firmware of JBOD, please follow the procedures.
  • Page 98: Mpio And Mc/S

    Figure 5.7.2.1 Choose a JBOD which wants to upgrade. Please prepare new firmware file in local hard drive, then click “Browse” to select the file. Click “Confirm”. After finished upgrading, the system must reboot manually to make the new firmware took effect. 5.8 MPIO and MC/S These features come from iSCSI initiator.
  • Page 99 MC/S: MC/S (Multiple Connections per Session) is a feature of iSCSI protocol, which allows combining several connections inside a single session for performance and failover purposes. In this way, I/O can be sent on any TCP/IP connection to the target. If one connection fails, another connection can continue processing I/O without interruption to the application.
  • Page 100: Trunking And Lacp

    LACP packets to the peer. Theoretically, LACP port can be defined as active or passive. D-LINK IP SAN Storage implements it as active mode which means that LACP port sends LACP protocol packets automatically. Please notice that using the same configurations between D-LINK IP SAN Storage and gigabit switch.
  • Page 101: Dual Controllers (Only For Dsn-6120)

    LACP and enabled. Otherwise, host can not connect the link with storage device. 5.10 Dual controllers (only for DSN-6120) 5.10.1 Perform I/O Please refer to the following topology and have all the connections ready. To perform I/O on dual controllers, server/host should setup MPIO. MPIO policy will keep I/O running and...
  • Page 102: Ownership

    Figure 5.10.1.1 5.10.2 Ownership When creating RG, it will be assigned with a prefered owner, the default owner is controller 1. To change the RG ownership, please follow the procedures. Select “/ Volume configuration / RAID group”. Check the gray button next to the RG name; click “Set preferred owner”. The ownership of the RG will be switched to the other controller.
  • Page 103: Controller Status

    Figure 5.10.2.2 (Figure 5.10.2.2: The RG ownership is changed to the other controller.) 5.10.3 Controller status There are four statuses described on the following. It can be found in “/ System maintenance / System information”. Normal: Dual controller mode. Both of controllers are functional. Degraded: Dual controller mode.
  • Page 104: Replication

    5.11 Replication Replication function will help users to replicate data easily through LAN or WAN from one IP SAN storage to another. The procedures of Replication are on the following: 1. Copy all data from source VD to target VD at the beginning (full copy). 2.
  • Page 105 Figure 5.11.2 3. If you want the replication port to be on special VLAN section, you may assign VLAN ID to the replication port. The setting will automatically duplicate to the other controller. Create backup VD on the target IP SAN storage ...
  • Page 106 Figure 5.11.5 Create replication job on the source IP SAN storage  1. Click “Create” to create a new replication job. Figure 5.11.6 2. Select the source VD which will be replicated to the target IP SAN storage and click “Next”.
  • Page 107 Tips If the message displays that there is not enough space for creation, please refer to the section of Configure the snapshot space below for solution. 3. Enter the IP address of iSCSI port on controller 1 of the target IP SAN storage. Click “Next”...
  • Page 108 5. Choose the backup VD and click “Next”. Figure 5.11.10 6. A new replication job is created and listed on the Replication page. Figure 5.11.11 Run the replication job  1. Click the “OP” button on the replication job to open operation menu. Click “Start” to run the replication job.
  • Page 109 Figure 5.11.13 3. User can monitor the replication job from the “Status” information and the progress is expressed by percentage. Figure 5.11.14 Create multi-path on the replication job  1. Click the “Create multi-path” in the operation menu of the replication job. Figure 5.11.15 2.
  • Page 110 Figure 5.11.16 3. Select the iSCSI node to log on and click “Next”. Figure 5.11.17 4. Choose the same target VD and click “Next”.
  • Page 111 Figure 5.11.18 5. A new target will be added in this replication job as a redundancy path. Figure 5.11.19 Configure the replication job to run by schedule  1. Click “Schedule” in the operation menu of the replication job. Figure 5.11.20...
  • Page 112 Configure the snapshot space  The Replication uses Snapshot technique of D-LINK, to help user to replicate the data without stop accessing to the source VD. If the snapshot space is not configured on the source VD in advance, the IP SAN storage will allocate snapshot space for the source VD automatically when the replication job is created.
  • Page 113 There are three settings in the Replication configuration menu, The Snapshot space specifies the ratio of snapshot space allocated to the source VD automatically when the snapshot space is not configured in advance. The default ratio is 2 to 1. It means when the replication job is creating, the IP SAN storage will automatically use the free space of RG to create a snapshot space which size is double of the source VD.
  • Page 114: Vlan

    5.12 VLAN VLAN (Virtual Local Area Network) is a logical grouping mechanism implemented on switch device using software rather than a hardware solution. VLANs are collections of switching ports that comprise a single broadcast domain. It allows network traffic to flow more efficiently within these logical subgroups.
  • Page 115 4. VLAN ID 66 for LAN2 is set properly. Figure 5.12.3 Assign VLAN ID to LAG(Trunking or LACP)  1. After creating LAG, press “OP” button next to the LAG, and select “Set VLAN ID”. Figure 5.12.4 2. Put in the VLAN ID and click ok. VLAN ID of LAG 0 is properly set. Figure 5.12.5...
  • Page 116 3. If iSCSI ports are assigned with VLAN ID before creating aggregation takes place, aggregation will remove VLAN ID. You need to repeat step 1 and step 2 to set VLAN ID for the aggregation group. Assign VLAN ID to replication port ...
  • Page 117: Chapter 6 Troubleshooting

    Chapter 6 Troubleshooting 6.1 System buzzer The system buzzer features are listed below: The system buzzer alarms 1 second when system boots up successfully. The system buzzer alarms continuously when there is error occurred. The alarm will be stopped after error resolved or be muted. The alarm will be muted automatically when the error is resolved.
  • Page 118 ERROR SATA PRD mem fail Failed to init SATA PRD memory manager ERROR SATA revision id fail Failed to get SATA revision id ERROR SATA set reg fail Failed to set SATA register ERROR SATA init fail Core failed to initialize the SATA adapter ERROR SATA diag fail SATA Adapter diagnostics failed...
  • Page 119 RMS events  Level Type Description INFO Console Login <username> login from <IP or serial console> via Console INFO Console Logout <username> logout from <IP or serial console> via Console INFO Web Login <username> login from <IP> via Web UI INFO Web Logout <username>...
  • Page 120 INFO BBM status good Battery backup module is good INFO BBM status Battery backup module is charging charging WARNING BBM status fail Battery backup module is failed INFO BBM enabled Battery backup feature is <string>. INFO BBM inserted Battery backup module is inserted INFO BBM removed Battery backup module is removed...
  • Page 121 INFO Volt recovery Voltage of <string> in JBOD <string> is NORMAL WARNING Therm warn OT Temperature of <string> read as <string> in JBOD <name> is OT WARNING WARNING Therm warn UT Temperature of <string> read as <string> in JBOD <name> is UT WARNING WARNING Therm fail OT...
  • Page 122 ERROR CTR memory NG Memory size mismatch ERROR CTR firmware NG Firmware version mismatch ERROR CTR lowspeed NG Low speed inter link is down ERROR CTR highspeed NG High speed inter link is down ERROR CTR backend NG SAS expander is down ERROR CTR frontend NG FC IO controller is down...
  • Page 123: Certification List

    NC360T (PCI-Express, Gigabit, 2 ports, TCP/IP offload) NetXtreme 1000 T (73P4201) (PCI-X, Gigabit, 2 ports, TCP/IP offload) Intel PWLA8492MT (PCI-X, Gigabit, 2 ports, TCP/IP offload) GbE Switch  Vendor Model D-Link All of D-Link Managed Gigabit Switch Dell PowerConnect 5324...
  • Page 124: Hard Drive

    Dell PowerConnect 2724 Dell PowerConnect 2708 ProCurve 1800-24G Netgear GS724T ZyXEL GS2200 Hard drive  SAS drives are recommanded on dual controller system. For SATA drives, SATA bridge boards are required in dual controller configuraiton. SAS 3.5” Vendor Model Hitachi Ultrastar 15K147, HUS151436VLS300, 36GB, 15000RPM, SAS 3.0Gb/s, 16M Hitachi Ultrastar 15K300, HUS153073VLS300, 73GB, 15000RPM, SAS 3.0Gb/s, 16M (F/W:...
  • Page 125 K2A0AD1A) Hitachi Deskstar E7K1000, HDE721010SLA330, 1TB, 7200RPM, SATA 3.0Gb/s, 32MB, NCQ (F/W: ST60A3AA) Hitachi UltraStar A7K2000, HUA722020ALA330, 2TB, 7200RPM, SATA 3.0Gb/s, 32MB, NCQ (F/W: JKAOA20N) Maxtor DiamondMax Plus 9, 6Y080M0, 80GB, 7200RPM, SATA, 8M Maxtor DiamondMax 11, 6H500F0, 500GB, 7200RPM, SATA 3.0Gb/s, 16M Samsung SpinPoint P80, HDSASP0812C, 80GB,7200RPM, SATA, 8M Seagate...
  • Page 126: Microsoft Iscsi Initiator

    B. Microsoft iSCSI initiator Here is the step by step to setup Microsoft iSCSI Initiator. Please visit Microsoft website for latest iSCSI initiator. This example is based on Microsoft Windows Server 2008 R2. Connect  Run Microsoft iSCSI Initiator. Input IP address or DNS name of the target. And then click “Quick Connect”. Figure B.1 Click “Done”.
  • Page 127 Figure B.2 Figure B.3 It can connect to an iSCSI disk now. MPIO  If running MPIO, please continue. Click “Discovery” tab to connect the second path. Click “Discover Portal”. Input IP address or DNS name of the target.
  • Page 128 Figure B.4 Figure B.5 Click “OK”. Figure B.6 Figure B.7...
  • Page 129 Click “Targets” tab, select the second path, and then click “Connect”. 10. Enable “Enable multi-path” checkbox. Then click “OK”. 11. Done, it can connect to an iSCSI disk with MPIO. MC/S  12. If running MC/S, please continue. 13. Select one target name, click “Properties…”. 14.
  • Page 130 Figure B.10 Figure B.11 17. Select Initiator IP and Target portal IP, and then click “OK”. 18. Click “Connect”. 19. Click “OK”. Figure B.12 Figure B.13 20. Done.
  • Page 131 Disconnect  21. Select the target name, click “Disconnect”, and then click “Yes”. Figure B.14 22. Done, the iSCSI device disconnect successfully.
  • Page 132: From Single Controller To Dual Controller

    C. From single controller to dual controllers This SOP applies to upgrading from DSN-6110 to DSN-6120 as well as from DSN-6410 to DSN-6420. Before you do this, please make sure that either DSN-6110 or DSN-6410 is properly installed according to the manuals, especially the HDD trays. If you are...
  • Page 133 Please follow the steps below to upgrade to dual controller mode. Step 1 Go to “Maintenance\System”. Copy the IP SAN storage serial number. Step 2 Go to “Maintenance\Upgrade” and paste the serial number into “Controller Mode” section. Select “Dual” as operation mode.
  • Page 134 Step 3 Click “confirm”. The system will ask you to shutdown. Please shutdown IP SAN storage. Click Ok.
  • Page 135 Power off DSN-6110 or DSN-6410. Insert the second controller to the IP SAN storage. And then power on the system. The IP SAN storage should now become in dual controller mode as either DSN-6120 or DSN-6420. You may go to “Maintenance\System information” to check out. The IP SAN storage is...

This manual is also suitable for:

Dsn-6110

Table of Contents