APC iSCSI SATA II Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung APC iSCSI SATA II an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von APC iSCSI SATA II, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung APC iSCSI SATA II die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung APC iSCSI SATA II. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung APC iSCSI SATA II sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts APC iSCSI SATA II
- Den Namen des Produzenten und das Produktionsjahr des Geräts APC iSCSI SATA II
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts APC iSCSI SATA II
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von APC iSCSI SATA II zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von APC iSCSI SATA II und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service APC finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von APC iSCSI SATA II zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts APC iSCSI SATA II, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von APC iSCSI SATA II widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    iSCSI – SATA II RAID SUBSYSTEM Installation and Configuration Manual Revision 1.0 P/N: PW0020000000328[...]

  • Seite 2

    [2] Table of Contents Chapter 1 Introduction ........................................................................................... 4 1.1 Key Features ............................................. ........................................................................................................... 5 1.2 Technical S pecifi cations .......[...]

  • Seite 3

    [3] 3.5.1 Entit y Property ........................................ ............................................................... ................................. 38 3.5.2 NIC.................................................... ............................................................... ............................................ 39 3.5.3 N[...]

  • Seite 4

    [4] Chapter 1 Introduction The iSCSI RAID Subsystem The iSCSI RAID subsystem is a 4 -bay disk array based on hardware RAID configuration. It is an easy-to-use storage system which can be co nfigured to any RAID level. It provides reliable dat a protection f or servers, and the RAID 6 function is available. Th e RAID 6 function allow s failure of tw[...]

  • Seite 5

    [5] 1.1 Key Features ¾ Front-end 2 x 1Gigabit port full iSC SI offload ¾ Supports iSCSI jumbo frame ¾ Supports RAID levels 0, 1, 0+1, 3, 5, 6 , 10 and JBOD ¾ Global hot spare disks ¾ Write-through or write-back cache policy for differen t application usage ¾ Supports greater than 2TB per vo lume set (64-bit LBA support) ¾ RAID level migratio[...]

  • Seite 6

    [6] 1.2 Technical Specifications Form Factor : 1U 19-inch rackmount chassis RAID processor : Intel XScale IOP331 Instant RAID volu me availabilit y and background initializ ation su pport RAID Level : 0, 1, 0+1, 3, 5, 6, 10 and JBOD Supports over 2TB per volume Cache memory : 512MB ~ 1GB DDR333 DIMM supported Online consisten cy check No. o[...]

  • Seite 7

    [7] 1.3 Terminology The document uses the following terms: RAID RAID is the abbreviation of “R edundant A rray of I ndependent D isks ” . There are different RAID level s with different degree of the data protection, data availability, and performance to host environment. PD The P hysical D isk belongs t o th e member di sk of one specific RAID[...]

  • Seite 8

    [8] DS D edicated S pare disks. The spare disks ar e only used by one specific RG. Others could not use these dedicated spare disks for any rebuilding purpose. GS G lobal S pare disks. GS is shared for rebuilding purpose. If some RGs need to use the global spare disks for rebuilding, they could get the spare disks out from the common s pare disks p[...]

  • Seite 9

    [9] 1.4 RAID Concepts RAID Fundamentals The basic idea of RAID (Redundant Array of Independent Disks) is to combine multipl e inexpensive disk driv es into an array of disk drives to obtain performance, capacity and reliability that exceeds that of a single large drive. The array of drives appears to the host computer as a single logical drive. Fiv[...]

  • Seite 10

    [10] Definition of RAID Levels RAID 0 is typically defined as a group o f stripe d disk drives without parity or data redundancy. RAID 0 arrays can be config ured with large stripes for multi-us er environments or small stripe s for single-user systems th at access long sequential records. RAID 0 arrays delive r the best data storage effici ency an[...]

  • Seite 11

    [11] RAID 3 sector-stripes data acros s groups of drives, but one drive in the group is dedicated to storing parity information. RA ID 3 relies on the embedded ECC in each sector for error detection. In the case of drive failure, data recovery is accomplish ed by calculating the exclu sive OR (XOR) of the inf ormation recorded on the remain ing dri[...]

  • Seite 12

    [12] Dual-level RAI D achieves a balance between the incr eased data availability inherent in RAID 1 and RAID 5 and the increased read performance inherent i n disk striping (RAID 0). These arrays are sometimes referred to as RAID 0 +1 or RAID 10 and RAID 0+5 or RAID 50. RAID 6 is similar to RAID 5 in that data protection is achieved by writing par[...]

  • Seite 13

    [13] RAID Management The subsystem can implement sev eral different levels of RAID technology . RAID levels supported by the subsystem are shown below. RAID Level Description Min. Drives 0 Block striping is provid e, which yields higher performance than with individual drives. There is no redundancy. 1 1 Drives are paired and mirrored. All data is [...]

  • Seite 14

    [14] 1.5 Volume Relationship Diagram This diagram shows how the volume st ructure of the iSCSI RAID subsystem is designed. It describes the relationship of RAID compo nents. One RG (RAID group) consists of a set of VDs (Vi rtual disk) and owns one RAID le vel attribute. Each RG can be divided into several VDs. The VDs in one RG share the same RAID [...]

  • Seite 15

    [15] Chapter 2 Getting Started 2.1 Packaging, Shipment and Delivery  Before removing the subsystem from the shipping carton, you should visually inspect the physical condit ion of the shipping cart on.  Unpack the subsystem and verify that th e co ntents of the shipping carton are all there and in good cond it ion.  Exterior damage to the [...]

  • Seite 16

    [16] 2.3 Identifying Parts of the iSCSI RAID Subsystem The illustrations below iden tify the various parts of the su bsystem. 2.3.1 Front View 1 Carrier Open Butt on – Use this to open the disk tray. Press the butt on to open. This button also shows the Lock Ind icat or . When the Lock Groove is horizontal, this indicates that the Drive Tray is l[...]

  • Seite 17

    [17] 5 LCD Display Panel 6 LCD Control Module (LCM) Use the function keys to navigate t hrough the menu options avail able in the LCM. Parts Function Up and Down Arrow buttons Use the Up or Down arrow keys to go through the i nformation on the LCD screen. This is also used to move between each menu when you configure the subsystem. Select button Th[...]

  • Seite 18

    [18] 2.3.2 Rear View 1. Uninterruptible Power Su pply (UPS) Port (APC Smart UP S only) The subsystem may come wi th an optional UPS port all owing you to connect a APC Smart UPS device. Connect the cable from the UPS device to the UPS port located at the rear of the subsystem. This w ill automatically al low the subsystem to us e th e functions and[...]

  • Seite 19

    [19] 2.4 Connecting the iSCSI RA ID Subsystem to Your Network To connect the iSCSI uni t to the network, insert the ca ble that came with the u nit into the Gigabit networ k port (LAN1) on the ba ck of iSCSI unit. Insert the other end into a Gigabi t BASE-T Ethernet connection on your network hub or swi tch. You may connect the other network port L[...]

  • Seite 20

    [20] 2.6 Installing Hard Drives The expansion chassis supports hot-swa pping allowing you to inst all or replace a hard drive while the s ubsystem is running. Each Drive Carrier has a locking mechanis m. When the Lock Gr oove is hori zontal, this indicates that the Driv e Carrier is locked. When the Lock Groove is vertical , the Drive Carrier is un[...]

  • Seite 21

    [21] 2.7 iSCSI Introduction iSCSI (Intern et SCSI) is a protocol wh ic h encapsulates SCSI (Sm all Computer System Interface) commands and data in T CP/IP packets for linking stora ge devices with servers over common IP in frastructure s. iSCSI provi des high performance SANs over standard IP netw orks like LAN, WAN or the Internet. IP SANs are tru[...]

  • Seite 22

    [22] 1. Link to download t he Microsoft iSCSI softw are initiator: http://www.microsoft.com/downl oads/details.aspx?FamilyID=12cb3c1a-15d6- 4585-b385-befd1319f825&DisplayLang=en Please refer to Appendix D for Microsoft iSCSI initiator installation procedur e. 2. Linux iSCSI initiator i s also available. For different kernels, there are differen[...]

  • Seite 23

    [23] http://192.168.10 .50 or https://192.168.10.50 (https : connection w ith encr ypted Secure Sockets La yer (SSL). Please be aware of the https function is sl ower than http.) Click any funct ion at the f irst time; it will pop up a dialog t o authenticate cu rrent user. Login name: admin Default password: 00000000 Or login with the read-on ly a[...]

  • Seite 24

    [24] 2.9 Enclosure 2.9.1 LCD Control Module (LCM) There are four buttons to control the subsys tem LCM (LCD Control Module). These are: c (Up) d (Down) (Enter) (Escape) After booting up the system , the following screen sho ws management port IP and model name: 192.168.10.50 iSCSI-Model-Name ← Press “ ” , the LCM functi ons “System Info,”[...]

  • Seite 25

    [25] The following is the LCM menu hierarchy. [Firmware Version] [System Info.] [RAM Size] [Alarm Mute] [ c Yes N o d ] [Reset] [ c Yes No d ] [Reset/Shutdown] [Shu tdown] [ c Yes No d ] [Quick Install] RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 xxx GB [Apply The Config] [ c (Yes No d ] [Local] RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 [Use defa[...]

  • Seite 26

    [26] 2.9.2 System Buzzer The system buzzer features are described as follows: 1. The system buzzer alarms 1 second wh en system boots up suc cessfully. 2. The system buzzer alarms continuous ly when there is error level event happened. The alarm will be stopped after mute. 3. The alarm will be muted automatically when the error situati on is resolv[...]

  • Seite 27

    [27] Chapter 3 W eb GUI Guideline 3.1 iSCSI RAID Subsystem GU I Hierarchy The below table is the hierar chy of the subsystem GUI. Quick installation Æ Step 1 / Step 2 / Confirm System configuration System setting Æ System name / Date and time IP address Æ MAC address / Address / DNS / port Login setting Æ Login configuration / Admin password / [...]

  • Seite 28

    [28] Reboot and shutdown Æ Reboot / Shutdown Logout Sure to logout? 3.2 Login The iSCSI RAID subsystem su pports graphical user int erface (GUI) to operate the system. Be sure to connect the LAN cable. The default IP setti ng is DHCP ; open web browser and enter: http://192.168.10.50 (Please check the DHCP address first on LCM) Click any funct ion[...]

  • Seite 29

    [29] 3.2.1 Language Before clicking the Login button, you can ch ange the GUI l anguage if needed. There are 4 options to select: English , Simplified Chinese, German , and French. 3.2.2 Status Indicators There are six indicators at the top-right corner . 1. RAID light: Green means RAID works well. Red represents RAID failure happening. 2. Temperat[...]

  • Seite 30

    [30] 3.3 Quick Install It is easy to use “Qui ck install” to create a volume. It uses whole physical disks to create a RG. The system will calcu late maximum spaces on RAID levels 0/1/3/5/6/ 0+1. “Quick install” will occupy all residual RG space for on e VD, and it has no space for spare disk. If spare disk is needed, plea se create RG and [...]

  • Seite 31

    [31] 3.4 System Configuration “Sys tem co nfig urat ion” is designed for setting up the “System s etting” , “IP address” , “Login setting” , “M ai l setting” , and “Notification setting” .[...]

  • Seite 32

    [32] 3.4.1 System Setting Select “System setting” to change system name and date. Default s ystem name is the model name, e.g.: SB-1404-G1A3. Check “Change date and time” option to set up the current date, time, and ti me zone before using, or sync hronize time from NTP (Network Ti me Protocol) server.[...]

  • Seite 33

    [33] 3.4.2 IP Address Select “IP address” to change IP address for remote admini stration usage. There are 2 options, DHCP (Get IP address from DHCP ser ver) or Static (static IP). The default setting is DHCP e nabled. User can change the HTTP, HTTPS, and SSH port number when the default port number is not allowed on host/serv er.[...]

  • Seite 34

    [34] 3.4.3 Login Setting Select “Login setting” to set s ingle admin login, set the au to logout timing, and change admin or user password. The single admi n login can prevent m ultiple users to access the same iSCSI RAID system at the sa me time. 1. Auto logout: The options are (1) Disable; (2) 5 minutes; (3) 30 minutes; (4) 1 hour. The system[...]

  • Seite 35

    [35] 3.4.4 Mail Setting Select “Mail setting” to enter at most 3 mail addresses for receiving event notifications. Some ma il servers would check “Mail- from address” and need authenticat ion for anti-spam. Please fill t he necessary fields and select “Send test mail” to check whether the email works fine. User can also select which lev[...]

  • Seite 36

    [36] 3.4.5 Notification Setting You can use “Notification setting” to set up SNMP trap for sending alerts via SNMP , pop-up messages via Wi ndows Messenger (not MSN), and alerts via syslog pr otocol, and set event log filter. “SNMP” allows up to 3 SNMP tra p addresses. Default c ommunity is set to “public”. User can choose the event log[...]

  • Seite 37

    [37] Using “Messenger” , user must enable the service “Messe nger” in Windows (Start Æ Control Panel Æ Administrative Tools Æ Services Æ Messenger), and then event l ogs can be received. It allows up to 3 messe nger addresses. User can choose the event log levels. Note th at in default settings, only the WARNING and ERROR even t logs ar[...]

  • Seite 38

    [38] 3.5 iSCSI Config “iSCSI config” selection is for the setup of “Entity Pr operty” , “NIC” , “Node” , “Session” , and “CHAP account” . 3.5.1 Entity Property Select “Entity property” to view the enti ty name of the iSCSI RAID subs ystem, and setup “iSNS IP” for iSNS (I nternet Storage Name Service) service. iSNS pr[...]

  • Seite 39

    [39] 3.5.2 NIC Select “NIC” to change IP addresses of iSCSI da ta ports. There are two gigabit LAN ports to transmit data. Each of them must be assigned one IP a ddress in multi-home d mode. The screen sh ot above show s the 2 iSCSI dat a ports. Each of th em is set to st at ic IP. LAN1 has Jumbo Frame enabled. IP settings: User can change IP a[...]

  • Seite 40

    [40] 3.5.3 Node Select “Node” to view the target name for iSCSI node. Press “Authenticate” to enable CHAP authentication. CHAP is the abbreviation of Challenge Han dshake Authorization Protocol. CHAP is a strong authe ntication method used in point-to-point for user login. It’s a t ype of authentication i n which the authentication server[...]

  • Seite 41

    [41] 3.5.4 Session “Session” function can display iSCSI session an d connection information, including the following it ems: 1. Host (Initiator Name) 2. Error Recovery Level 3. Error Recovery Count 4. Detail of Authentication status and Source IP: port number. Move the mouse pointer to the gr ay button of session number and click “List connec[...]

  • Seite 42

    [42] 3.5.5 CHAP Account Enter “CHAP account” function to create a CHAP account for authentication. To setup CHAP account, please follow these steps: 1. Click “ ”. 2. Enter account name in “User” box, and type the secret in “Secret” and “Confirm” bo x es. 3. Click “ ”. 4. T o delete the CHAP acco unt, select “ Delete ”. N[...]

  • Seite 43

    [43] 3.6 Volume Configuration “Volume configur ation” is designed for setting u p the volume configurat ion which includes “Volume create wizard” , “Physical disk” , “RAID grou p” , “Virtu al disk” , “Snapshot”, and “Logical unit” . NOTE: Snapshot function is not avail able in the iSCSI RAID subsystem.[...]

  • Seite 44

    [44] 3.6.1 Volume Create Wizard “Volume create wizard” has a smarter policy. When the system is inserted with some HDDs. “Volume creat e wizard” lists all possibilit ies and siz es in different RAID levels, it wi ll use all a vailable HD Ds for RAID level dep ends on which u ser chooses. When system has different sizes of HD Ds, e.g., 3*200[...]

  • Seite 45

    [45] Step 3: Deci de VD size. User can enter a num be r less or equal to the default number. Then click “ ”. Step 4: Confirm page. Click “ ” if all setups are correct. Then a VD will be created. It’s done. You can sta rt to use the system no w.[...]

  • Seite 46

    [46] 3.6.2 Physical Disk Enter “Physical disk” to view t he status of hard dr ives inserted in the system. The following are operation t ips: 1. Move the mouse pointer to the gray butt o n n e x t t o t h e n u m b e r o f s l o t , i t will show the fu nctions which can be executed. 2. Active function(s ) can be selected, but inactive func tio[...]

  • Seite 47

    [47] It’s done. View the “Physical disk” page. Physical disks of slots 1, 2, and 3 are used for RG named “QUICK37598”. Slot 4 is set as dedicated spare di sk for RG “QUICK37598”. PD column description: Slot The position of hard drives. T he button next to the number of slot shows the functions which can be executed. Size (GB) Capacity[...]

  • Seite 48

    [48] a global spare of all RGs. “RS” Æ R e S erve. The hard drive contains the RG information but cannot be used. It may be caused by an uncompleted RG set, or hot-plug of this disk in the running time. In order to protect t he data in the disk, the status changes to reserve. It can be reused after setting it t o “FR” manually. Vendor Hard[...]

  • Seite 49

    [49] 3.6.3 RAID Group Enter “Volume group” to view the status of e ach volume group. The following is an example of how to create a RG: Step 1: Click “ ”, enter “Name” , choose “RAI D level” , click “ ” to select PD. Then click “ ”. Step 2: Confirm page. Click “ ” if all setups are correct. It’s done. View the “RAID [...]

  • Seite 50

    [50] RG column description: No. Number of RAID group. The butto n next to the No. s hows the functions which can be executed. Name RAID group name. Total(GB) Total capacity of this RAID group. Free(GB) Free capacity of this RAID group. #PD The number of physical disks in RAID group. #VD The number of virtual disks in RAID group. Status The status o[...]

  • Seite 51

    [51] RG operations description: Create Create a RAID group. Migrate Migrate a RAID group. Please refer to succeeding c hapter for more detail. Activate Activate a RAID grou p; it can be executed whe n RG status is offline. Th is is for online roaming pu rpose. Deactivate Deactivate a RAID group; it can be executed when RG status is online. T h is i[...]

  • Seite 52

    [52] 3.6.4 Virtual Disk Enter “Virtua l disk” function to v iew the status of each user data volume. The following is an example of how to create a VD: Step 1: C lick “ ”, ente r “Name” , choose “RG name” , “Stripe height (KB)” , “Block size (B)” , “Read/Wri te” mode, “Priority” , “Bg rate” (Background task pri o[...]

  • Seite 53

    [53] Right “WT” Æ W rite T hrough. “WB” Æ W rite B ack. “RO” Æ R ead O nly. Priority “HI” Æ HI gh priority. “MD” Æ M i D priority. “LO” Æ LO w priority. Bg rate Background task priority. “4 / 3 / 2 / 1 / 0” Æ Default value is 4. The hi gher number the background priority of a VD has, the more background I/O will b[...]

  • Seite 54

    [54] UDV operations description: Extend Extend a Virtual disk capaci ty. Scrub Scrub a Virtual disk. It’s a pari ty re generation function. It supports RAID 3 / 5 / 6 only. Delete Del ete a Virtual disk. Set property Change the VD name, righ t, priority and bg rate. Right options: “WT” Æ W rite T hrough. “WB” Æ W rite B ack. “RO” Æ[...]

  • Seite 55

    [55] 3.6.5 Logical Unit Enter “Logical unit” f unction to view the status of attached logical uni t number of each VD. User can attach LUN by clicking the “ ”. Select the VD to attach in the “ VD ” field. In the “Host” filed, enter the iSCSI node name for access contr ol, or use the default wildcard “*”, which means every host c[...]

  • Seite 56

    [56] 3.6.6 Example The following is an example for creating vo lum es. Example 1 is to create two VDs and set a global spare disk. ¾ Example 1 Example 1 is to create two VDs in one RG, each VD uses global cache volume. Global cache volume is created after system boots up automatically . So, no action is needed to set CV . Then set a global spare d[...]

  • Seite 57

    [57] Step 2: Create VD (Virt ual disk). To create a volume, please follow these steps: 1. Select “/ Volume configuration / Virtual disk” . 2. Click “ ”. 3. Input a VD name, choose a RG Name and enter a size of VD; decide the stripe high, block size, read/write mode and set pri ority , finally click “ “. 4. Done. A VD has been c reated. [...]

  • Seite 58

    [58] Step 3: Atta ch LU N t o VD. There are 2 methods to attach LUN to VD . 1. In “/ Volume configuration / Virtual disk” , mo ve the mouse pointer to the gra y button next to the VD number; cl ick “ Attac h LUN” . 2. In “/ Volume confi guration / Logical unit ” , click “ ”. The procedures are as follows: 1. Select a VD . 2. Input ?[...]

  • Seite 59

    [59] Step 4: Set global spare disk. To set a global spare disk , please follow the step. 1. Select “/ Volume configuration / Physic al disk” . 2. Move the mouse pointer to the gr ay button ne xt to the PD slot; cli ck “Set Global spare” . 3. “GS” icon is shown in “Usage” column. Step 5: Done. Host initiator can connect to the LUNs a[...]

  • Seite 60

    [60] Step 7: Delete VD (Vi rtual disk). T o delete the Virtual disk , please follow the steps: 1. Select “/ Volume configuration / Virtual disk” . 2. Move the mouse poi nter to the gra y button next to the VD number; click “Delete” . There will pop up a confirmation page, click “OK” . 3. Done. The VDs are deleted. NOTE: When deleting VD[...]

  • Seite 61

    [61] 3.7 Enclosure Management “Enclosure manage ment” function allo ws managing encl osure information including “SES config” , “Hardware monitor” , “S.M.A.R.T.” and “UPS” fun ctions. For the enclosure management, there are many sensors for different purposes, such as temperature sensors, voltage sensors, hard disks, fan s ensor[...]

  • Seite 62

    [62] 3.7.1 SES Configuration SES represents S CSI E nclosure S ervices, one of the enclosure manag ement standards. Use “SES conf ig” function to enable or disabl e the management of SES. To enable SES: 1. Click “Enable”. 2. Enter Host name (iSCSI no de name). Click “Co nfirm”. 3. Done. The SES client soft ware is availabl e at the foll[...]

  • Seite 63

    [63] 3.7.2 Hardware Monitor Enter “Hardware m o nitor” func tion to view the informatio n of current voltage, temperature, power supply, and fa n status. If “Auto shutdown” has been checked, the system wi ll shutdown automaticall y when voltage or temperature is out of the normal range. For b etter data protection, pl ease check “ Auto Sh[...]

  • Seite 64

    [64] 3.7.3 Hard Drive S.M.A.R.T. Function S.M.A.R.T. ( S elf- M onitoring A nalysis and R epor tin g T echn ology) is a diagnostic too l for hard drives to deliv er warning of drive fai lures in advance. S.M .A.R.T. provides users chances to take a ctions be fore possible drive failure. S.M.A.R.T. measures many attributes of the hard dri ve all the[...]

  • Seite 65

    [65] 3.7.4 UPS Enter “UPS” fu nction to set up UP S ( U ninterruptibl e P ower S upply). Currently, the system only support and commu nicate with smart-UPS f unction of APC (American Power Conversi on Corp.) UPS. Please check detail from http://www.apc.com/ . First, connect the RAID system UPS port and the APC UPS via RS-232 for communication. [...]

  • Seite 66

    [66] 3.8 System Maintenance “Maintenance” allows the operation of system functions wh ich include “System information” to show the system version, “Upgr ade” to update firmware to latest version, “Reset to factory default” to reset all cont roller config uration valu es to factory settings, “Import and export” to import and expo[...]

  • Seite 67

    [67] 3.8.2 Upgrade “Upgrade” can upgrade firmware. Please pr epare new firmware file named “xxxx.bin” in local hard drive, then click “ ” to select the file. Click “ ”, it will pop up a message “Upgrade syst em now? If you want to downgrade to the previous FW later (not recommended), please export your system configuration f irst![...]

  • Seite 68

    [68] 3.8.4 Config Import & Export Use “Import and export” f u n c t i o n t o i m p o r t o r e x po rt c o n f i g u r a t i o n . “ E xp o rt ” a l l o w s user to save system configuration v alues, and “Import” to apply sav ed configuration. For the volume configu ration setting, the values are available in export and not availab[...]

  • Seite 69

    [69] 3.8.5 Event Log Use “Event log” to view the system event messa ges. Check the INFO, WARNING, and ERROR checkboxes to choose the leve l of event log t o display. Clicking “ ” button will save the wh ole event log as a text f ile with file name “log-ModelName-Date-Time .txt” (e.g., log-SB-1404-G1A3-20080723- 150659.txt). Click ” ?[...]

  • Seite 70

    [70] 3.8.6 Reboot and Shutdown “Reboot and shutdown” displays “Reboot” and “Shutdown” buttons. Before power off, it is better to execute “Shutdown” to fl ush the data from cache to physi cal disks. The step is necessary for data protection. 3.9 Logout For security reason, “Logout” function will allow user t o logout when it is n[...]

  • Seite 71

    [71] Chapter 4 Advanced Operation 4.1 Rebuild If one physical disk of a Raid Group, which is set to a protected RAID level ( e.g.: RAID 3 , R A I D 5 , o r R A I D 6 ) , i s F A I L E D o r h a s b e e n u n p l u g g e d / r e m o v e d , t h e R G s t a t u s i s changed to degraded mode. The system will search/ detect spare disk to rebuild the d[...]

  • Seite 72

    [72] Sometimes, rebuild is called recover; thes e two have the same me aning. The foll owing table is the relationship bet w een RAID levels and rebuild. RAID 0 Disk striping. No protection for data. RG fail s if any hard drive fails or unplugs. RAID 1 Disk mirroring over 2 disks. RAID 1 allows one hard drive fails or unplugging. Need one n ew hard[...]

  • Seite 73

    [73] 4.2 RG Migration To migrate the RAID level, pl ease follow below procedures. 1. Select “/ Volume configuration / RAI D group” . 2. Move the mouse poi nter to the gr ay button next to t he RG number; click “Migrate” . 3. Change the RAID level by clicking the down arrow t o “RAID 5 ” . There will be a pup-up which ind icates that HDD[...]

  • Seite 74

    [74] 6. Migration starts and it can be seen from the “status” o f a R G w i t h “Migrating” . In “/ Volume configuration / Virtual disk” , it displays a “Migrating” in “Sta tus” and complete percentage of migration in “R%” . To do migration, the tot al size of RG must be larger or equ al to the original RG. It does not allow[...]

  • Seite 75

    [75] 4.3 VD Extension To extend VD size, please follow the procedures. 1. Select “/ Volume configuration / Virtual disk” . 2. Move the mouse poi nter to the gra y button next to the VD number; click “Extend” . 3. Change the size. The size must be larger th an the original, an d then click “ “ to start extension. 4. Extension starts. If [...]

  • Seite 76

    [76] 4.5 Disk Roaming Physical disks can be re-sequenced in the same system or move all ph ysical disks from system-1 to system-2. This is called disk roaming. System can execute disk roaming online. Please follow the procedures. 1. Select “/ Volume configuration / RAI D group” . 2. Move the mouse poi nter to the gr ay button next to the RG num[...]

  • Seite 77

    [77] Appendix A. Certification List RAM RAM Spec: 184pins, DDR333(PC2700), Reg. (register) or UB(Unbufferred), ECC or Non-ECC, from 64MB to 1GB, 32-bit or 64-bit data bus width, x8 or x16 devices, 9 to 11 bits column address. Vendor Model ATP AG64L72T8SQC4S, 512MB DDR-400 (ECC) with Samsung ATP AG28L64T8SHC4S, 1GB DDR-400 with Samsung ATP AG28L72T8[...]

  • Seite 78

    [78] build-in iSCSI initiator iscsi-i nitiator-utils-4.0.3.0-4 in kernel 2.6.9 3. For Red Hat Enterprise Linux 5 (Kernel 2.6), use the build-in iSCSI initiator iscsi -initiator-utils-6.2.0.742- 0.5.el5 in kernel 2.6.18 Mac ATTO Xtend SAN iSC SI initiator v3. 10 System Requirements: 1. Mac OS X v10.5 or later For ATTO Xtend SAN iSC SI init iator, it[...]

  • Seite 79

    [79] Hard drive Vendor Model Hitachi Deskstar 7K250, HDS722580VLSA80, 80GB, 72 00RPM, SATA, 8M Hitachi Deskstar E7K500, HDS 725050KLA360, 500GB, 7200RPM, SATA II, 16M Hitachi Deskstar 7K80, HDS728040PLA320, 40GB, 7200RPM, SATA II, 2M Hitachi Deskstar T7K500, HDT7 25032VLA360, 320GB, 7200RPM, SATA II, 16M Hitachi Deskstar P7K500, HDP7 25050GLA360, 5[...]

  • Seite 80

    [80] B. Event Notifications  PD events Level Type Description INFO Disk inserted Disk <slot> is inserted into system. WARNING Disk removed Disk <slot> is removed from sy stem. ERROR HDD failure Disk <slot > is disabled.  HW events Level Type Description WARNING ECC error Single-bit ECC error is detected. ERROR ECC error Mult[...]

  • Seite 81

    [81] auto shutdown immediately. WARNING SMART T.E.C. Disk <slot> S. M.A.R.T. Threshold Exceed Condition occurred f or attribute <item>. WARNING SMART failure Disk <slot>: Failu re t o get S.M.A.R.T information.  RMS events Level Type Description INFO Console Log in <username> login fro m <IP or serial console> via C[...]

  • Seite 82

    [82] started INFO VD migration finished VD <name> completes migration. ERROR VD migration failed Fail ed to complete migration of VD <name>. INFO VD scrubbing started VD <name> starts scrubbing. INFO VD scrubbing finished VD <name> completes scrubbing. INFO RG migration started RG <name> starts migration. INFO RG migra[...]

  • Seite 83

    [83] imported. INFO RG restored Configuration of RG <name> has been restored. INFO VD restored Configurati on of VD <name> has b een restored.  iSCSI events Level Type Description INFO iSCSI login succeeds iSCSI login from <IP> succeeds. INFO iSCSI login rejected iSCSI login from <IP> was rejected, reason [<string>][...]

  • Seite 84

    [84] occurred <address> of JBOD <number> PD <slot>. WARNING PD write error occurred Write error occurred at LBA <address>- <address> of JBOD <number> PD <slot>. INFO PD freed JBOD <number> PD <slot> has been removed from RG <name>.  System maintenance events Level Type Description INFO [...]

  • Seite 85

    [85] D. Microsoft iSCSI Initiator Here are the steps to setup Mi crosoft iSCSI Initiator . Please visit Microsoft websi te for latest iSCSI initiat or . T he following set u p may not use the latest Microsoft iSCSI initiato r . 1. Run Microsoft iSCSI Init iat or . 2. Click “Discovery” . 3. Click “Add” . Input IP address or DNS name of iSCSI[...]

  • Seite 86

    [86] 4. Click “OK” . 5. Click “Targets” .[...]

  • Seite 87

    [87] 6. Click “Log On” . Check “Enable multi-path” if running MPIO . 7. Click “Advance” if CHAP information is needed. 8. Click “OK” . The status would be “Connected” . 9. Done, it can connect to an iSCSI disk.[...]

  • Seite 88

    [88] The following procedu re is to log off iSCSI device. a. Click “Details” . b. Check the Identifier , which will be delet ed. c. Click “Log of f” . d. Done, the iSCSI device log off s uccessfully .[...]

  • Seite 89

    [89] E. Installation Steps fo r Large Volume (Over 2TB) Introduction: The iSCSI RAID subsystem is capable of supportin g large volumes (>2TB). When connecting controllers to 64bit OS installed host/server, the host/server is inherently capable for large volumes from the 64bit addr ess. On the other side, if the host/server is installed with 32bi[...]

  • Seite 90

    [90] Step 3: Initialize/F o rm at/Moun t the disk 1. Go to Start Æ Control P anel Æ Computer Management Æ Disk Manag ement, it displays a new disk. 2. Initialize th e disk. 3. Convert to GPT disk for over 2TB capacity . For more detail information about GPT , please visit http://www .microsoft.c om/whdc /device/storage/GPT_F AQ.mspx[...]

  • Seite 91

    [91] 4. For m a t t h e di s k . 5. Done. 6. The new disk is ready to use, the a vailable size = 2.72TB. WARNING: If user setups 512B block size for VD and the host/server OS is 32bit, in the last step of for matting disk, user will find OS cannot format t he disk sector after 2048GB (2TB).[...]

  • Seite 92

    [92] 7. W rong setting result: OS can not fo rmat disk sector after 2048GB(2TB). F. MPIO and MC/ S Setup Instructions Here is the instruct ion to setup MPIO. The following network diagrams are the examples. Please follow them to setup the environment. Remi nd that host must have multi NICs wh ich are set up with dif ferent IPs ¾ Network diagr am o[...]

  • Seite 93

    [93] The MPIO setup in structions are the following: 1. Create RG/VD , and then attach LU N. 2. Add the first “T arget Portal” on Microsoft iSCSI initiator . 3. Add the second “T arget Portal” on Microsoft iSCSI init iator . 4. Logon. 5. Enable “Enable multi- path” checkbox. Then click “Advanced…” . 6. Select the first “Source I[...]