Gebruiksaanwijzing /service van het product Thecus N4560 van de fabrikant Origin Storage
Ga naar pagina of 135
U ser ’ s Manual N2520/N2560/N4 520/N4560 Series.
ii Copyright and T r ademark No tice C opyright and T r ademark Notice Thecus and other name s of Thecus produc ts are registered trademar ks o f Thecus T echnolog y Corp. Microsof t, Windows, and the Windows lo go are registered trademarks o f Microso ft Cor poration.
iii Safet y Warnings Safety W arnings F or your sa fety, please read and follow the following safet y w arnings: Read this manual thoroughly before attempting to set up your Thecus IP stora ge . ¾ Y our Thecus IP storage is a complicated elec tronic device.
iv T able of Contents T able of C ontents C opyright and T rademark Notice . ............................................... ii About This Manual. ...................................................................... i i Limited W arran t y . ...
v T able of Contents 3.3.13 F actor y De fault. .......................................................................................................... 2 7 3.3.14 Po wer Management. ..................................................................
vi T able of Contents 3.6.13 Auto Thumbnail. ........................................................................................................ 82 3.6.14 ThecusID. .................................................................................
vii Chapter 1: I ntroduction Chapter 1: Intr oduc tion § Over view 1 .1 Thank you for choosing the Thecus IP Storage Ser ver . The Thecus IP storage is an easy-to -use storage ser ver that allows a dedica ted approach to stor ing and distr ibuting data on a net work .
viii Chapter 1: I ntroduction F ront Panel 1 .3 N2520/N2560: • The Thecus N2520/N2560 ’ s front panel shows the de vice’ s indicators and hard disk inst all slots: Fr ont P anel Item Description 1. HDD1 LED Blinking white: HD D activity Red: HDD failu re 2.
ix Chapter 1: I ntroduction N4520/N4560: • The Thecus N4520 /N4560 front p anel show s the de vice’ s indicator s, s ystem informa tion and hard disk tray s: Fr ont P anel Item Description 1. Power LED Solid blue: Power on 2. System statu s Blinking orange: Diagnostic mode k ick-in Solid orange: Diagnostic c ompleted 3.
x Chapter 1: I ntroduction Rear Panel 1 .4 N2520/N2560: • The N252 0/N2560 rear pan el features por ts and connectors . Back Panel Item Description 1. System F an System fan that exhausts heat from the unit. 2. HD MI F or Video/ Audio out 3. SPDIF For Audio out 4.
xi Chapter 1: I ntroduction N4520/N4560: • The N4520/N4 560 rear pane l features por ts and connectors . Back Panel Item Des cription 1. System F an Sy stem fan that exhausts heat from the unit. 2. USB Por ts USB 2.0 por t for compatible USB de vices, such as digital cameras, USB disks, and USB pr inters.
12 Chapter 2: Hardware I nstallation Chapter 2: Har dware Installation § O ver v iew 2. 1 Yo u r Thecus IP s torage is designed for easy installation. T o help you ge t st ar ted, the following chapter will help you quick ly ge t your Thecus IP stor age up and running.
13 Chapter 2: Hardware I nstallation P ress the power button on the F ront P anel to boot up the Thecus IP storage . 3. N2520/N2560 pow er button S N4520/N4560 power button S.
14 Chapter 3: Sy stem Administration Chapter 3: S yst em Administr ation § Over view 3 .1 The Thecus IP storage provides an easily acce ssible Web Administration I nter face. With it, you can configure and moni tor the Thecus IP s torage any where on the net work .
15 Chapter 3: Sy stem Administration Add Shor tcut 3. 2.1 The user inter face wi th “ Add Shor tcut ” shor tcut allows the user to designate o ften use d items and have them display on the main screen area. The figure below displays sy stem add shor tcut funct ions.
16 Chapter 3: Sy stem Administration Message Bar 3. 2.3 Y ou can ge t quick information about your sys tem status by moving your mouse over these icons. Me ssage Bar Item Status Description RAID M anagement Display the s tatus of created RAID volume. Click to go to RAID Management page a s shor t cut.
17 Chapter 3: Sy stem Administration Language S elec tion 3 .2.6 The Thecus IP stora ge suppor ts multiple Languages, including: English Japanes e T radi tional Chinese Simplified Chinese.
18 Chapter 3: Sy stem Administration Sy stem/ Ser vice Status 3.3 .2 F rom the System Management categor y,, choose the Status item, S ystem S er vice Status and HW S ta- tatus ite m, System Ser vice Status and HW Sta- item, System Ser vice Status an d HW Sta- Ser vice Status and HW Sta- and HW Sta- HW Sta- Sta - tus sc reens appear .
19 Chapter 3: Sy stem Administration Expor t log option This can be set to A uto Export or Aut o Delete . Log Type The def ault logs displayed are for system e vents. Fr om the dropdown list, administrators can choose from various forms o f user access, such as AFP , Samba, e tc.
20 Chapter 3: Sy stem Administration Use r A ccess Log 3.3 .5 The Us er Acc ess Log Suppor t sec tion allows administra tors to selec t the desired protoc ols to record user activ ity for . User Access Log User Access Log Item Description User access log Enable or disable the User Access Log service.
21 Chapter 3: Sy stem Administration T o e xpor t det ails f rom the User Acc ess Log as a single f ile from target folder, administrator s mus t first selec t the desired number of rec ords f rom the dropdown list and also selec t the “ Auto expor t ” option.
22 Chapter 3: Sy stem Administration Congura tion with syslog client and target to s tore remotely : • See the following table for a detailed des cription of each item: Syslog Management Item Description Syslog D aemon Enable/Disable syslog daemon .
23 Chapter 3: Sy stem Administration Sy stem Monitor 3. 3.7 The sy stem monitor i s capable to monitor s ystem st atus includ ing C PU/memor y utilization, networ k throughput and on-line user list in var ious proto cols. T o monitor sy stem s tatus, simply click on “ System M onitor ” f rom the tree menu and the screen will appear as below .
24 Chapter 3: Sy stem Administration F or the on- line user s list, sy stem monitor will display the on-line users and the share folder they have visited . System Moni tor Item Description Save Layout Saving selecte d monitoring items. Layout will remain the same for fu ture visits.
25 Chapter 3: Sy stem Administration Date an d T ime : S etting system t ime 3.3 .8 F rom the Sy stem M anagement categor y , choos e the Date and Time item and the Date and Time screen appears.
26 Chapter 3: Sy stem Administration Scheduled On/O 3.3 .1 0 Using the The cus IP stor age Sy stem Management, you c an save energy and money by sche duli ng the Thecus IP stora ge to tu rn itself on a nd off duri ng certain ti mes of the da y.
27 Chapter 3: Sy stem Administration Admi nistrator Password 3.3 .1 1 F rom the Sy stem Management categor y , choose the Administra tor Password item and the C hange Administrator P assword screen appears. Enter a new pass word in the New Password box and con - firm your new password i n the Confi rm Passwo rd box.
28 Chapter 3: Sy stem Administration Resetting to factor y def aults will not erase the data s tored in the hard disks, but WILL rever t all the settings to the f actor y def ault values P ower Management 3.3 .1 4 F rom the Sys tem Management categor y , choose P ower Management item, and the Shutdown/R e - boot System screen appears .
29 Chapter 3: Sy stem Administration Once you click Nex t, you will see the following screen: Click Star t to begin the file system check. Click Reboot to reboot the s ystem. When the file sy stem check is running, the sy stem w ill show 20 lines of infor mation until it is com - plete.
30 Chapter 3: Sy stem Administration The system must be rebooted before Thecus IP storage can func tion normally af ter le system check completes. W ak e -Up On LAN ( WOL) 3.3 .1 6 The Thecus IP stora ge has the abilit y to be awok en f rom sleep mo de via LAN por t .
31 Chapter 3: Sy stem Administration UI Login F unc tion 3.3 .1 8 Adjusts UI Login Configurati on se ttings, you can enable/disable t he W eb Disk , Photo S er ver an d modules f unctions, according to your nee ds.
32 Chapter 3: Sy stem Administration Netmask/Prefix Length I nput net mask for IPv4 and Pr efix len gth for IPv6. Gate way Gate way for associate NIC . Def ault gate way It can be chose n from a d r o p d o w n l i s t o f d e f a u l t g a t e w a y tha t’ s been used for the The cus IP storage.
33 Chapter 3: Sy stem Administration Disks Information Item Description Di sk N o. Indicates disk location. Capacity Shows the SA T A hard disk capacity. Model Displays the SA T A hard disk model name. Firmware Shows the SA T A hard disk firmware version.
34 Chapter 3: Sy stem Administration S.M.A.R.T . Information Item De scription T r ay Number T ray the hard disk is inst alled in. Model Model name of the installed hard disk .
35 Chapter 3: Sy stem Administration The bad block scan can be termin ated by click ing on “ Stop Detec t Bad Block ” . RAID Management 3.4 .2 F rom the Storage categor y , c hoose the RAID M anagement item and the RAID Management screen appear s.
36 Chapter 3: Sy stem Administration Di sk N o. Number assig ned to the installed har d disks. Capacity (MB) Capacity of the instal led hard disks. Model M odel nu mber of the install ed hard disks. Status Status of the installed hard disks. Used If this is check ed, current hard disk is aalready par t of a RAID volume .
37 Chapter 3: Sy stem Administration In a multiple R AID conguration, one RA ID volume must be designated as th e Maste r RAID volume. The M aster R AID volum e will s tore all installed modules. I f the Master RAID is changed to another loc ation (i.
38 Chapter 3: Sy stem Administration Please keep your USB disk in a safe place and also backup the encr ypte d k e y. Th ere is no wa y to rescu e data back if th e key is lost. With R AID volume encr yption enabled, the system per formance will go down.
39 Chapter 3: Sy stem Administration P ress “ Ye s ” for R AID volume creat ion preparation. Then click “ Finish ” to star t up with RAID 1 0. volume building. Building a RAID volume may be time consuming, depending on the size of hard drives and R AID mode.
40 Chapter 3: Sy stem Administration Level Model JBOD RAID 0 RA ID 1 RAID 5 RAID 6 RA ID 10 N2520/ N2560 N4520/N4560 RAID configura tion is usually required only when you first se t up the de vice.
41 Chapter 3: Sy stem Administration.
42 Chapter 3: Sy stem Administration Remove R AID • Click to remove the R AID volume . All user data and iSCSI crea ted in the selec ted RAID volume wil l be deleted. To remove a RAID volume, follow the steps b elow : On the RAID List screen, select the RAID volume by clic k ing on its radio button, and cli ck RAID 1 .
43 Chapter 3: Sy stem Administration Migrating a RA ID (Dose not apply to the N2520/N2560 ) • Once a RAID volume has been created, you may want to move it to other physical dri ves or change the R AID array a ll tog ether .
44 Chapter 3: Sy stem Administration Migrating a R AID volume could tak e several hours to complete. • The RAID migration feature is available only when it is congurable. • Here is a list of limitation with RAID leve l migration function : During RAI D le vel m igration, it is not permitted to reboo t or shutdown system.
45 Chapter 3: Sy stem Administration NAS Stacking (N4520/N 4560 Only) 3.4 .3 The Thecus IP storage ’ s cap acity can b e expande d even fur ther using the stack able func tion. With i t, users c an expand the capacit y of their net work storage s ystems up to 5 other s tack t arget volumes which are loc ated in different s ystems.
46 Chapter 3: Sy stem Administration Nex t, input the target IP address of the s tack able de vice and click the Discover y button. The system will list available target volume s fro m the input ted IP addr ess. Once the volume IP has b een set , you may nee d to input a valid user name and p assword to validate your access r ight s .
47 Chapter 3: Sy stem Administration F rom the figure above, the Stack ed T arget name i s “ pmmeeting” . The figures below show the result before and after via M icr osof t N et work A ccess w hen set ting s have been completed . The Browseable setting is the same me thod us ed for setting a sys tem share folder .
48 Chapter 3: Sy stem Administration The Public setting will be set the same way as the set ting for the system share folder associated with the ACL per mission is . If Pu blic is set to Y es, all users will be able to access it, and ACL button will be gray ed out.
49 Chapter 3: Sy stem Administration With this new ly att ached stack t arget dev ice, you will see the infor mation displayed and also have access to s everal op tions to choose from .
50 Chapter 3: Sy stem Administration D . Stack T arget ACL If the stack target Public setting set to Ye s , then the ACL button will be grayed out. However , if P ublic setting is se t to No , then the ACL button wil l be av ailable for you to setup user acce ss per mission s for the stack tar get.
51 Chapter 3: Sy stem Administration ISO Image Mounting (N4520/N4560 Only) 3.4 .4 The ISO I mage M ounting feature is a ver y usef ul to ol f rom the Thecus product s. With it , users can mount an ISO file and hav e the expor t name display all the de tails f rom the mo unt ed I SO fil e.
52 Chapter 3: Sy stem Administration T o mount the ne w ISO file, selec t one file from the lis t of file s and inp ut the desired mounting name into the “ Mount as: ” field.
53 Chapter 3: Sy stem Administration iSCSI (N4520/N4560 Only) 3.4 .5 Y ou may spec ify the spa ce allocated for iSCSI. Se e the table below to the allowed iSCSI target num- See t he table below to the.
54 Chapter 3: Sy stem Administration The Create iSCSI V olume scree n appears. Create i SCSI V olume Item Description iSCSI T arget Volume Enable or Disable the iSCSI T arget Volume . T arget Name Name o f the iSCSI T arget. This name will b e used by the S tack able NAS func tion to identif y this ex - por t share.
55 Chapter 3: Sy stem Administration The iSCSI target volume creation will associate at least one L UN together . It can be assigned either “ Thin-Pro visioning” or “Inst ant Allocation ” . Enable the iSCSI T arget Vol ume by selec ting Enable.
56 Chapter 3: Sy stem Administration Expand V olu me • The iSCSI vol ume is now able to expand it s capacity from unused space (Instant Allocation mode only). F rom the volume list , simply selec t the iSCSI volume you like to expand and click the Expand button: Y ou wil l then see the d ialog box displayed b elow .
57 Chapter 3: Sy stem Administration Delete V olu me • To delete volume on the cur rent RAID volume, follow the steps below : Under the Volume Allocation List, click D elete . 1 . The Sp ace Alloc ation screen appears . P ress YES. All data in the volu me wil l be removed .
58 Chapter 3: Sy stem Administration volume is available from the list. Please ref e r to the screensho t below. If creating an iSC SI t arget volume under “Instant A llocation ” , physic al memor y i s as sign to the target , being limited by the available memor y .
59 Chapter 3: Sy stem Administration Nex t, input “ Initiator iqn ” and setup iSCSI target volume ac cess privilege s fro m the av ailable list . A pply by click ing the OK button. The ac cessible I nitiator will be listed as shown in the screen shot displaye d below .
60 Chapter 3: Sy stem Administration iSCSI CRC /Checksum T o enable this option, the initiator c an connec t wi th “ Data digest ” and “ Header digest ” .
61 Chapter 3: Sy stem Administration F ile Sharin g/Privilege 3.5 The Thecus IP storage has built-in user dat abase that allows administr ators to manage user ac cess using different gr oup policies.
62 Chapter 3: Sy stem Administration AD Domain Ex ample Item I nformation Work Group / D omain Name domain ADS Suppor t Enable ADS S er ver Name Computer1 ADS Realm D omain.
63 Chapter 3: Sy stem Administration All users are automatically assigned to the ‘ users’ gr oup. • Edit Users • Selec t an existing user f rom the Local User Configurat ion screen. 1 . Click on the Edit button, and the L ocal User Setting screen appea rs.
64 Chapter 3: Sy stem Administration Local Group C onguration 3. 5.3 F rom the File Sharing/Privilege c ategor y, choose the Group item, and the Local Group Configura tion screen appe ars. This sc reen allows you to Add, Edit, and R emove loc al groups.
65 Chapter 3: Sy stem Administration Edit Group s • On the Local Group Configurati on screen, select a group name from the list. 1 . P ress the E dit but ton to modi fy the members in a gr oup. 2. T o add a user into a group, selec t the user from the Users Lis t, and press the << button to 3.
66 Chapter 3: Sy stem Administration Shared F older 3.5 .5 F rom the Fi le Sharing /P r ivilege categor y , cho ose Shared Folder , and the Shared Folder screen ap - F ile Sharing/ P r ivilege categor.
67 Chapter 3: Sy stem Administration you to change folder information. Af ter en tering the information, press Apply to save your changes. Modify Folder Item Description F older Name Enter the name of the folder . Public Admit or deny public access to this folder .
68 Chapter 3: Sy stem Administration NFS Share • T o allow NFS acc ess to t he share folder , enable the NFS S er vice, and t hen se t up hosts wi th access rights b y click ing Add. NFS Sh are Item Description Hostname Enter the name or IP address of the host Privil ege Hos t has eit her read only or wr iteable access to the folder .
69 Chapter 3: Sy stem Administration Samb a Congurati on • On the F older screen, press the Samba but ton and the S amba Configuration s creen appear s. This screen allows you to setup samba c onfiguration for assoc iated folder . Af ter entering the informa tion, press Apply to ac tivate input settings.
70 Chapter 3: Sy stem Administration A CL setting Item Description Deny Denies ac cess to us ers or grou ps who are displayed in this c olumn. Read Only P rovides R ead Only access to users or groups who are displayed in this c olumn. Writable Provides Write access to users or groups who are displayed in this column.
71 Chapter 3: Sy stem Administration The ACL can only be se t for share and sub- folders level, not for les. The ACL screen also allows you to s earch for a par ticular user . T o do this, follow the steps below : In the b lan k , enter the name of the user you would lik e to find.
72 Chapter 3: Sy stem Administration User and Group Back up 3. 5.7 The user and group b ackup feature allow sy stem user s and groups to be back ed up to an other location and be res tore d if needed.
73 Chapter 3: Sy stem Administration LDAP Suppor t (N4520/ N4560 Only ) 3. 5.8 The LDAP is another way to authenticate login users w ho have joined the LDAP ser ver . Y ou will need to fill in the LDAP ser ver informa tion to get LDAP authentic ation st ar ted.
74 Chapter 3: Sy stem Administration Network S er vice 3. 6 Use t he Net work Ser vic e c ategor y to mak e net work ser vic e suppor t sett ings. Samba / CIFS 3.6 .1 There are op tions allow Admin to Enable/Disable to operate Thecus IP storage ass ociated with Samba / CIFS protocol .
75 Chapter 3: Sy stem Administration The Thecus IP stora ge is supp or ted rec ycle bin via SMB /CIFS protoc ol. Simply enable the “Rec ycle Bin ” f unction and “Rec ycle F older Display ” then all of deleted files/ folders will reside in the “_N AS_Re cycle _(Associate d RDID V olume)” share folder .
76 Chapter 3: Sy stem Administration AFP (Apple Network Se tup) 3.6 .2 F rom the Networ k S er vice categor y, choose the A FP item, and the A FP Suppor t sc reen appe ars. This screen displays the c onfiguration items for the Apple Fi ling Protocol.
77 Chapter 3: Sy stem Administration FTP 3.6 .4 The Thecus IP storage can ac t as an FTP ser ver , enabling us ers to download and upload files wi th their f avorite FT P programs. F rom the Net work S er vice ca tegor y, choo se the FT P i tem, and the FTP screen appe ars.
78 Chapter 3: Sy stem Administration A de scription of each item follows: T FTP Item Description TFTP Enables T FT P Ser vice on t he Thecus IP storage . NICs Checked W AN/L AN1 or LAN2 to enable por t use Por t Specifies the por t number of an incoming connec tion on a non-standard por t.
79 Chapter 3: Sy stem Administration Disable HT TP suppor t and Enable Secure HT TP support to guarantee secure access . UPnP S er vice 3 .6.7 This device suppor ts UPnP Media ser ver, which allows us ers to play media files with UP nP client ( ex. DMA devic es).
80 Chapter 3: Sy stem Administration DDNS 3. 6.1 0 T o se t up a ser ver on the I nternet and enable the users to c onnect to it easily, a fixed and e asy-to remember hos t name is of ten requir ed. However, if the ISP provides only dynamic IP address, the IP address of the ser ver will change from time to t ime and is difficult to recall.
81 Chapter 3: Sy stem Administration UPnP P or t Management 3 .6.1 1 One o f the mos t conven t way to allow user s to acc ess required ser vices such as FTP , SSH, web disk and http etc. f rom Inter net environment is set ting UPn P por t management .
82 Chapter 3: Sy stem Administration We b D AV 3 .6. 12 The W ebDA V is an ex tended protoc ol of http( s) which allows remote access to your NAS s ystem.
83 Chapter 3: Sy stem Administration ThecusID 3.6 .1 4 Creating a Thecus ID w ill give you full access to all that Thecus has to offer . Af ter creating a Thecus ID , you‘ll receive a f ree* DDNS (i.
84 Chapter 3: Sy stem Administration If you don ’t have a Thecus ID, click “Register ” and the screen below will appe ar . Please fill in the required information and click Apply . Register Thecus ID Item Description Thecus ID Input a valid email address.
85 Chapter 3: Sy stem Administration Application Ser ver 3. 7 The Thecus IP storage supp or ts built-in application such as iTunes ser ver as well as a dd-on official or third -p ar t y app lications.
86 Chapter 3: Sy stem Administration Add-on O cial Applications 3. 7.2 There are sever al default pre -loade d official applications such as WebDisk, Piczz a (Photo ser ver ) and T ra nsm iss ion- Kit (BT d own load ma nag er) th at ca n be fou nd fr om t he Ap pli cati on Se r ve r cate gory .
87 Chapter 3: Sy stem Administration Backu p 3. 8 The re ar e a num ber of ways to ba ck up data w ith the Thecus IP s torage . Rsync T arget Ser ver 3 .
88 Chapter 3: Sy stem Administration Remote Data backup Item Description Add Add new task . Edit Edit selec t t ask. Remove Remove selec t task Star t If associated task has been setup in schedule and like to star t at once, click on to star t task right aw a y.
89 Chapter 3: Sy stem Administration Remote Data backup Item Des cription F ull Backup The “ F ull back up ” will have all shares from source backup to destination. I t could also create shares automatically f rom destination if it is not existent.
90 Chapter 3: Sy stem Administration F ull B ackup • Click on full back up and the se tup screen appear as below. F ill in the remote target IP (De stination) and port (need to be change d only if this por t is already in use). If encr yp tion is required then enable it.
91 Chapter 3: Sy stem Administration -F ill out all the necessar y details and choose your parameters Add Rsync B ackup T ask Item Description T ask Name This is how this task will appear in the task list . Backup T ype Real time: I t w ill backup folder s/files from source to target on the fl y .
92 Chapter 3: Sy stem Administration F rom the task lis t, you can now s ee the ne wly added task “ fullb ack01 ” . The back up is setup as “ real time ” . F rom the status field, “ P rocessing ” can be read as the back-up is per formed on the fly .
93 Chapter 3: Sy stem Administration Click “ Nex t ” and more setting app ear s . Th ese ar e the as t he set tings for “ F ull backup ” 3. Click “ F inish ” and the data guard task will ap pear in the list as show n below. 4. F rom the task list , you can now se e the newly added “ customback01 ” .
94 Chapter 3: Sy stem Administration iSCSI Backup • If the source unit contain s iSCSI volume, it can be back ed up t o the t arget uni t as a single file. The proc edure is the same as for t he pre vious “ F ull b ackup ” and “ Custom back up ” , selec t “ iSCSI backup ” from data guar d wizard.
95 Chapter 3: Sy stem Administration 4. Click “ F inish ” and the data guard task will appea r in the list as sho wn below. F rom the task list , you can now see the newly added “ iscsiback ” . This backup is setup as “ schedule ” . The source folder name will use iSCSI_+target volume name.
96 Chapter 3: Sy stem Administration This is a useful feature if the sy stem configuration ne eds to be re store d to a brand new unit . L e t ’s g o thru the following ex ample to see how it works .
97 Chapter 3: Sy stem Administration Click “ Nex t ” and a screen wil l app ear as show n below . I t has the listed available sy stem 3. configuration backup file s . Select the one you want and click nex t. Y ou also have the option to downloa d the current s ystem c onfiguration before restor ing fr om the backup file.
98 Chapter 3: Sy stem Administration T he backup configuration has different numbers of RAID volume than the curren t sy ste m (3 5. vs 1). I t can be k ept as the RAID volume mapping arranged by t he system , then car r y on to click “ F inish ” .
99 Chapter 3: Sy stem Administration Data Guar d (Local Backup) 3.8 .3 The Thecus product provides c omplete backup solution bet ween Thecus NAS s ystems as well as bet ween folders of local s ystem s . Remote Data backup Item Description Add Add a new task.
100 Chapter 3: Sy stem Administration Local Data backup Item Description Impor t This is associated with ex ternal device s which are added to the system such as USB disk. Yo u can sele ct a folder f rom an ex ternal de vice and impor t it to t he NAS as a share folder .
101 Chapter 3: Sy stem Administration impor t ed them to the NAS under the RAID60volume. Nex t, please selec t the path from the drop down list to save the log. Also , give the access permission whether these selecte d folders will be “ Public ” or no t af ter the impor t.
102 Chapter 3: Sy stem Administration N o w, you will see in the data guard task list that you have cr eated a t ask . And th at the sy stem ha s created 2 ne w share folders from the task jus t crea ted. Copy : click on “ Copy ” and this screen appea r s.
103 Chapter 3: Sy stem Administration F older to F older • F ol der t o exter nal devic e • External device to Folder •.
104 Chapter 3: Sy stem Administration Let ’ s tak e “ Folder to E xter nal de vice ” as an e xample. I n the s ource pan e , s elect the d esired R AID volume and its associated folder list will appe ar ; same method i n the t arget pa ne for the associated ex ternal de vice.
105 Chapter 3: Sy stem Administration Read the note s and check the “ Accept ” box for con firmation. N o w, you will see in the data guard task list that you have cr eated a t ask . Realtime Back up: click on “ Realti me Backup ” and this scree n wil l ap pear .
106 Chapter 3: Sy stem Administration Nex t, fill in the task name and related settings..
107 Chapter 3: Sy stem Administration Realtime Backup Item Description T ask Name Input the task name, length limited to 4~ 12 charac ters . Sync T ype Selec t “ I ncremental ” or “ Synchronize ” . Back up Symb olic Link Choose to back up symbolic link which is included in the source.
108 Chapter 3: Sy stem Administration Schedule Back up: click on “ Schedule B ackup ” an d this screen w ill. 2 differen t choices can be 4. selec ted fro m , folder to folder , folder to ex ternal dev ice. Let ’ s use “ F older to Ex ternal device ” backup for our example.
109 Chapter 3: Sy stem Administration Read the note s and check the “ Accept ” box for con firmation. N o w, you will see in the data guard task list that you have cr eated a t ask . iSCSI Back up: click on “ iSCSI Ba ck up ” and scr een appear as below .
110 Chapter 3: Sy stem Administration Let ’ s take exam ple to have “ iSCSI to F older ” backup, from existed iSCSI volume “ iSCSI_iscsiv502 ” to volume RAID folder “ andy_local ” .
111 Chapter 3: Sy stem Administration task list will have created task listed. T o st ar t the iSCSI volume back up , selec t the task and click “ St ar t ” from task bar . Once “ Start ” click , the associated iSCSI volume will not allow to I/O during backup processing .
112 Chapter 3: Sy stem Administration iSCSI Import: click on “ iSCS I I mport ” and screen appear as below . 6. It can be impor ted from t wo different storage pools , folder to iSC SI or ex ternal dev ice to iSCSI. I t is depend on where iSCSI volume has b ackup to .
113 Chapter 3: Sy stem Administration Nex t, provide where the task log will store. Reading the note and check on “ Accept ” for confirma tion. Now , from the data guard task list will ha ve created task listed .
114 Chapter 3: Sy stem Administration F or the ACL res tore , it can be restored in the same system or used in an other unit. F or e xample, l e t ’s rest ore th e ACL backu p file to an other unit. This unit has a RAID volume “ RAIDpm ” with share folder s as listed on right ha nd screen shot.
115 Chapter 3: Sy stem Administration Data Bu rn 3.8 .5 The data burn is featured to suppor t 3 different modes o f data burning for files/folders to and from image file and physical optical disk . The 3 different modes are “ Write F iles/folder s to disc ” , “ Wr ite ima ge to disk ” and “ Write files/ folders to image ” .
116 Chapter 3: Sy stem Administration Selec t f rom the installed USB bur ning devic es. Ple ase click t h e “ detec t disc ” button to c. check the s tatus onc e the disc is inser ted. Selec t the burnin g speed from the drop down li st. d. Selec t whe ther disc data verifica tion is required or not.
117 Chapter 3: Sy stem Administration Selec t the ISO file. b . Selec t f rom the installed USB bur ning devic es. Ple ase click t h e “ detec t disc ” button to c. check the s tatus onc e the disc is inser ted. Selec t the burning speed from the drop down l ist.
118 Chapter 3: Sy stem Administration Input the path where the ISO file is going to be store d , you can press the “ Brow se ” c. button to have the share list appear . Inpu t the ISO file name for burned image file. d . Click “ Burn ” to start the ISO file burning.
119 Chapter 3: Sy stem Administration W indo ws XP SP2 • T o set up the P r inter S er ver in Windows XP SP2, follow the steps below : Connect the USB printer to one of the USB por ts (preferably the rear USB por ts ; f ront USB 1 . por ts can be used for ex ternal HDD enclosures).
120 Chapter 3: Sy stem Administration Selec t Add a net work , wireless or Bluetooth pr inter . 3. Selec t The printer that I want isn ’t listed. 4. Y ou can press The printer that I w ant isn ’t lis ted to go into ne xt p age without waiting for Searching for av ailable printers to finish.
121 Chapter 3: Sy stem Administration T yp e ht tp:// <Thecus_NAS>: 631/printers/usb -printer in the box , where <Thecus_NA S_IP> is the IP address of Thec us IP stor age . Click Nex t. Selec t or install a printer and then press OK . 6. Windows w ill attempt to connec t to the printer .
122 Chapter 3: Sy stem Administration Done! Click F inish. 9..
123 Chapter 3: Sy stem Administration Uninterrupted P ower S ource 3.9 .2 F rom the Extern al Devices menu, choose the U ninterrup ted Power Source item and the UPS S etting screen appe ars. Mak e any changes you wish, and press Apply to confirm changes.
124 Appendix A: Customer Suppor t Appendix A: C ustomer Suppor t If you are still e xperiencing problems wi th your Thecus IP storage , o r require a R eturn M erchandise Authoriza tion (RMA), feel f ree to contac t te chnical suppor t via our T echnical Suppor t W ebsite: http: //w ww.
125 Appendix B: RAID Bas ics Appendix B: RAID Basics O ver v iew • A Redundant Ar ray of I ndependent Disks (R AID) is an ar ray of sever al hard disks tha t provide dat a securi ty and high per formance. A R AID s ystem acc esses se veral hard disks simultane ously , which improves I /O per for mance over a single hard disk .
126 Append ix B: RAID Basi cs RAID 5 RAID 5 offers data se curity and i t is best suited for net works that per form many small I /O tr ansactions at the same time, as well as applications that require data securi ty such as office automation and on - line custo mer ser vice.
127 Appendix B: RAID Bas ics listed bel ow : RA ID Leve l Per centage Used RAID 0 100% RAID 1 1/n x 100 % RAID 5 (n- 1)/ n x 10 0% RAID 6 (n-2)/n x 10 0% RA ID 10 50% JBOD 100 % n: HD D number.
128 Appendix C: Active Director y Basics Appendix C: A c tive Dir ec tor y Basics O ver v iew • With Wind ows 2000, Microsof t introdu ced Active Director y (ADS), which is a large database/ information store. Prior to Ac tive Direc tor y t he Windows O S c ould not s tore a dditional infor mation in its domain database.
129 Appendix D: Licensing Informat ion Appendix D: Lic ensing I nf ormation O ver v iew • This product included c opyrighted third-par t y so ft ware licensed under the ter ms of GNU Gener al Pu blic Lic ense. Please see THE GNU Gener al Public License for ex tra ter ms and c onditions o f this license.
130 Appendix D: Licensing Informat ion C GIC L icense T erms • Basic License CG IC, copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004 by Thomas Boutell and Boutell . Com, I nc. P er mission is granted to use CGIC in any application, commercial or noncommercial, at no co st.
131 Appendix D: Licensing Informat ion the recipients all the r ights that you have. Y ou must make sure that they, too, receive or can get the so urc e code .
132 Appendix D: Licensing I nformation warr ant y pro tect ion in exchange for a fe e. 2. Y ou may modify your copy or copies of the P rogram or any por tion of it , thus forming a work based on the P.
133 Appendix D: Licensing Informat ion ware interchange; or , b) Accompa ny it with a written o ffer , valid for at least three years, to give any third part y , for a charge no more than your cos t .
134 Appendix D: Licensing Informat ion 7. If, as a cons equence of a cour t judgment or allegation of patent infr ingement or for any other reason (not limited to pa tent issues), c onditions are impo.
135 Appendix D: Licensing Informat ion riv atives o f our free sof t ware and o f promot ing the shar ing and reuse of sof tw are generally . NO W ARRANT Y 11. BEC A USE THE PRO GRAM IS LICENSED FREE OF CHAR GE, THERE IS NO W ARRANT Y FOR THE PROGRAM, TO THE EXTENT PERMIT TED BY APPLI CABLE LA W .
Een belangrijk punt na aankoop van elk apparaat Origin Storage Thecus N4560 (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen Origin Storage Thecus N4560 heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens Origin Storage Thecus N4560 vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding Origin Storage Thecus N4560 leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over Origin Storage Thecus N4560 krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van Origin Storage Thecus N4560 bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de Origin Storage Thecus N4560 kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met Origin Storage Thecus N4560 . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.