Typical Setup Procedure; Step 1: Network Setup; Step 2: Raid Creation; Step 3: Create Local Users Or Setup Authentication - Thecus N3200 User Manual

Thecus n3200 ip storage appliance user’s manual
Hide thumbs Also See for N3200:
Table of Contents

Advertisement

Typical Setup Procedure

From the Web Administration Interface, you can begin to setup your N3200 for
use on your network. Setting up the N3200 typically follows the five steps
outlined below.
For more on how to use the Web Administration Interface, see Chapter 4:
System Management >

Step 1: Network Setup

From the Web Administration Interface, you can configure the network settings of
the N3200 for your network. You can access the Network menu from the menu
bar.
For details on how to configure your network settings, refer to Chapter 4:
System Management >

Step 2: RAID Creation

Next, administrators can configure their preferred RAID setting and build their
RAID volume. You can access RAID settings from the menu bar of the Web
Administration Interface by navigating to Storage > RAID.
For more information on configuring RAID, see Chapter 4: System
Management >
RAID
Don't know which RAID level to use? Find out more about the different RAID
levels from
Appendix C: RAID

Step 3: Create Local Users or Setup Authentication

Once the RAID is ready, you can begin to create local users for the N3200, or
choose to setup authentication protocols such as Active Directory (AD).
For more on managing users, go to Chapter 4: System Management >
and Group
Management.
For more information on configuring Active Directory, see Chapter 4: System
Management > User and Group Management >
For information about the benefits of Active Directory, see
Directory
Basics.

Step 4: Create Folders and Set Up ACLs

Once users are introduced into your network, you can begin to create various
folders on the N3200 and control user access to each using Folder Access Control
Lists.
More information on managing folders, see Chapter 4: System Management >
Folder
Management.
To find out about configuring Folder Access Control Lists, see Chapter 4: System
Management > Folder Management >
Web Administration
Network
Management.
Configuration.
Basics.
Folder Access Control List
20
Interface.
ADS/NT
Configuration.
Appendix D: Active
User
(ACL).

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents