Origin Storage Thecus N2560 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Origin Storage Thecus N2560, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Origin Storage Thecus N2560 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Origin Storage Thecus N2560. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Origin Storage Thecus N2560 should contain:
- informations concerning technical data of Origin Storage Thecus N2560
- name of the manufacturer and a year of construction of the Origin Storage Thecus N2560 item
- rules of operation, control and maintenance of the Origin Storage Thecus N2560 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Origin Storage Thecus N2560 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Origin Storage Thecus N2560, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Origin Storage service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Origin Storage Thecus N2560.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Origin Storage Thecus N2560 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    U ser ’ s Manual N2520/N2560/N4 520/N4560 Series[...]

  • Page 2

    ii Copyright and T r ademark No tice C opyright and T r ademark Notice  Thecus and other name s of Thecus produc ts are registered trademar ks o f Thecus T echnolog y Corp. Microsof t, Windows, and the Windows lo go are registered trademarks o f Microso ft Cor poration. Apple, i T unes and Apple OS X are registered trademar ks of A pple Computer[...]

  • Page 3

    iii Safet y Warnings Safety W arnings  F or your sa fety, please read and follow the following safet y w arnings: Read this manual thoroughly before attempting to set up your Thecus IP stora ge . ¾ Y our Thecus IP storage is a complicated elec tronic device. DO NOT at tempt to re - Thecus IP storage is a complicated elec tronic device. DO NOT a[...]

  • Page 4

    iv T able of Contents T able of C ontents  C opyright and T rademark Notice . ............................................... ii About This Manual. ...................................................................... i i Limited W arran t y . ........................................................................ i i Sa fet y W arnings. .....[...]

  • Page 5

    v T able of Contents 3.3.13 F actor y De fault. .......................................................................................................... 2 7 3.3.14 Po wer Management. ................................................................................................ 28 3.3.15 F ile System Check . .....................................[...]

  • Page 6

    vi T able of Contents 3.6.13 Auto Thumbnail. ........................................................................................................ 82 3.6.14 ThecusID. ...................................................................................................................... 83 3.7 Application Ser ver . ................................[...]

  • Page 7

    vii Chapter 1: I ntroduction Chapter 1: Intr oduc tion § Over view 1 .1 Thank you for choosing the Thecus IP Storage Ser ver . The Thecus IP storage is an easy-to -use storage ser ver that allows a dedica ted approach to stor ing and distr ibuting data on a net work . Data reliabil - it y is ensured with RAID features tha t provide data securit y [...]

  • Page 8

    viii Chapter 1: I ntroduction F ront Panel 1 .3 N2520/N2560: • The Thecus N2520/N2560 ’ s front panel shows the de vice’ s indicators and hard disk inst all slots: Fr ont P anel Item Description 1. HDD1 LED Blinking white: HD D activity Red: HDD failu re 2. HDD2 LED Blinking white: HD D activity Red: HDD failu re 3. LAN LED Solid white: LAN C[...]

  • Page 9

    ix Chapter 1: I ntroduction N4520/N4560: • The Thecus N4520 /N4560 front p anel show s the de vice’ s indicator s, s ystem informa tion and hard disk tray s: Fr ont P anel Item Description 1. Power LED Solid blue: Power on 2. System statu s Blinking orange: Diagnostic mode k ick-in Solid orange: Diagnostic c ompleted 3. LAN LED Gr een : Net wor[...]

  • Page 10

    x Chapter 1: I ntroduction Rear Panel 1 .4 N2520/N2560: • The N252 0/N2560 rear pan el features por ts and connectors . Back Panel Item Description 1. System F an System fan that exhausts heat from the unit. 2. HD MI F or Video/ Audio out 3. SPDIF For Audio out 4. LAN Po r t LAN por t for conne cting to an Etherne t net work through a switch or a[...]

  • Page 11

    xi Chapter 1: I ntroduction N4520/N4560: • The N4520/N4 560 rear pane l features por ts and connectors . Back Panel Item Des cription 1. System F an Sy stem fan that exhausts heat from the unit. 2. USB Por ts USB 2.0 por t for compatible USB de vices, such as digital cameras, USB disks, and USB pr inters. 3. LAN P or t L AN por t for connec ting [...]

  • Page 12

    12 Chapter 2: Hardware I nstallation Chapter 2: Har dware Installation § O ver v iew 2. 1 Yo u r Thecus IP s torage is designed for easy installation. T o help you ge t st ar ted, the following chapter will help you quick ly ge t your Thecus IP stor age up and running. Please read it c arefully to pre vent damaging your unit during inst allation. [...]

  • Page 13

    13 Chapter 2: Hardware I nstallation P ress the power button on the F ront P anel to boot up the Thecus IP storage . 3. N2520/N2560 pow er button S N4520/N4560 power button S[...]

  • Page 14

    14 Chapter 3: Sy stem Administration Chapter 3: S yst em Administr ation § Over view 3 .1 The Thecus IP storage provides an easily acce ssible Web Administration I nter face. With it, you can configure and moni tor the Thecus IP s torage any where on the net work . W eb Admin istration Inter f ace 3. 2 Mak e sure your net work is connec ted to th[...]

  • Page 15

    15 Chapter 3: Sy stem Administration Add Shor tcut 3. 2.1 The user inter face wi th “ Add Shor tcut ” shor tcut allows the user to designate o ften use d items and have them display on the main screen area. The figure below displays sy stem add shor tcut funct ions. Administr ator s c an add or remove add shor tcut func tion s to M y F avorite[...]

  • Page 16

    16 Chapter 3: Sy stem Administration Message Bar 3. 2.3 Y ou can ge t quick information about your sys tem status by moving your mouse over these icons. Me ssage Bar Item Status Description RAID M anagement Display the s tatus of created RAID volume. Click to go to RAID Management page a s shor t cut. Disks I nformation Display the status of disks [...]

  • Page 17

    17 Chapter 3: Sy stem Administration Language S elec tion 3 .2.6 The Thecus IP stora ge suppor ts multiple Languages, including: English  Japanes e  T radi tional Chinese  Simplified Chinese  F rench  German  I talian  K orean  Spanish  Russian  Po li s h  P or t uguese  On the menu bar , click L anguage and t h[...]

  • Page 18

    18 Chapter 3: Sy stem Administration Sy stem/ Ser vice Status 3.3 .2 F rom the System Management categor y,, choose the Status item, S ystem S er vice Status and HW S ta- tatus ite m, System Ser vice Status and HW Sta- item, System Ser vice Status an d HW Sta- Ser vice Status and HW Sta- and HW Sta- HW Sta- Sta - tus sc reens appear . These screens[...]

  • Page 19

    19 Chapter 3: Sy stem Administration Expor t log option This can be set to A uto Export or Aut o Delete . Log Type The def ault logs displayed are for system e vents. Fr om the dropdown list, administrators can choose from various forms o f user access, such as AFP , Samba, e tc. Note: Users need to enable the “User Access Log ” ser vice to vie[...]

  • Page 20

    20 Chapter 3: Sy stem Administration Use r A ccess Log 3.3 .5 The Us er Acc ess Log Suppor t sec tion allows administra tors to selec t the desired protoc ols to record user activ ity for . User Access Log User Access Log Item Description User access log Enable or disable the User Access Log service. Folder Select from the dropdown list where to st[...]

  • Page 21

    21 Chapter 3: Sy stem Administration T o e xpor t det ails f rom the User Acc ess Log as a single f ile from target folder, administrator s mus t first selec t the desired number of rec ords f rom the dropdown list and also selec t the “ Auto expor t ” option. Please choose the number of logs e xpor t and click “ Apply ” to acti vate the s[...]

  • Page 22

    22 Chapter 3: Sy stem Administration Congura tion with syslog client and target to s tore remotely : • See the following table for a detailed des cription of each item: Syslog Management Item Description Syslog D aemon Enable/Disable syslog daemon . Syslog ser vice If S er ver has been selected then ass ociated syslog folder will be used to st[...]

  • Page 23

    23 Chapter 3: Sy stem Administration Sy stem Monitor 3. 3.7 The sy stem monitor i s capable to monitor s ystem st atus includ ing C PU/memor y utilization, networ k throughput and on-line user list in var ious proto cols. T o monitor sy stem s tatus, simply click on “ System M onitor ” f rom the tree menu and the screen will appear as below . I[...]

  • Page 24

    24 Chapter 3: Sy stem Administration F or the on- line user s list, sy stem monitor will display the on-line users and the share folder they have visited . System Moni tor Item Description Save Layout Saving selecte d monitoring items. Layout will remain the same for fu ture visits. Reset Layout Set back to default monitoring se ttings and layout .[...]

  • Page 25

    25 Chapter 3: Sy stem Administration Date an d T ime : S etting system t ime 3.3 .8 F rom the Sy stem M anagement categor y , choos e the Date and Time item and the Date and Time screen appears. S et the de sired Date, Time, and Time Zone. Y ou can also elec t to s ynchronize the sys - tem time on Thecus IP stor age wi th an NTP (Net work Time Prot[...]

  • Page 26

    26 Chapter 3: Sy stem Administration Scheduled On/O 3.3 .1 0 Using the The cus IP stor age Sy stem Management, you c an save energy and money by sche duli ng the Thecus IP stora ge to tu rn itself on a nd off duri ng certain ti mes of the da y. F rom the System Management categor y, choose the S cheduled On/ O ff item and the Scheduled On/ O ?[...]

  • Page 27

    27 Chapter 3: Sy stem Administration Admi nistrator Password 3.3 .1 1 F rom the Sy stem Management categor y , choose the Administra tor Password item and the C hange Administrator P assword screen appears. Enter a new pass word in the New Password box and con - firm your new password i n the Confi rm Passwo rd box. Pr ess Apply to confirm passw[...]

  • Page 28

    28 Chapter 3: Sy stem Administration Resetting to factor y def aults will not erase the data s tored in the hard disks, but WILL rever t all the settings to the f actor y def ault values P ower Management 3.3 .1 4 F rom the Sys tem Management categor y , choose P ower Management item, and the Shutdown/R e - boot System screen appears . Pre ss R ebo[...]

  • Page 29

    29 Chapter 3: Sy stem Administration Once you click Nex t, you will see the following screen: Click Star t to begin the file system check. Click Reboot to reboot the s ystem. When the file sy stem check is running, the sy stem w ill show 20 lines of infor mation until it is com - plete. Once complete, the results will be shown at the bo ttom.[...]

  • Page 30

    30 Chapter 3: Sy stem Administration The system must be rebooted before Thecus IP storage can func tion normally af ter le system check completes. W ak e -Up On LAN ( WOL) 3.3 .1 6 The Thecus IP stora ge has the abilit y to be awok en f rom sleep mo de via LAN por t . F rom the System Management c ategor y, choose the W OL item, and the W ak e -[...]

  • Page 31

    31 Chapter 3: Sy stem Administration UI Login F unc tion 3.3 .1 8 Adjusts UI Login Configurati on se ttings, you can enable/disable t he W eb Disk , Photo S er ver an d modules f unctions, according to your nee ds. Network ing 3.3. 19 F rom the System M anagement cate gor y , choo se Net work ing, and the Net work ing C onfigur ation screen appears[...]

  • Page 32

    32 Chapter 3: Sy stem Administration Netmask/Prefix Length I nput net mask for IPv4 and Pr efix len gth for IPv6. Gate way Gate way for associate NIC . Def ault gate way It can be chose n from a d r o p d o w n l i s t o f d e f a u l t g a t e w a y tha t’ s been used for the The cus IP storage. Only use Jumbo Frame se ttings when operating in[...]

  • Page 33

    33 Chapter 3: Sy stem Administration Disks Information Item Description Di sk N o. Indicates disk location. Capacity Shows the SA T A hard disk capacity. Model Displays the SA T A hard disk model name. Firmware Shows the SA T A hard disk firmware version. Bad Block scan Y es to star t scan Bad Block. S.M.A.R.T . In formation • On the Disk I nfor[...]

  • Page 34

    34 Chapter 3: Sy stem Administration S.M.A.R.T . Information Item De scription T r ay Number T ray the hard disk is inst alled in. Model Model name of the installed hard disk . Power ON Hours Count of hours in power-on st ate. T he r aw value of this attribute show s total count of hours (or min - utes, or seconds, depending on manufac turer) in po[...]

  • Page 35

    35 Chapter 3: Sy stem Administration The bad block scan can be termin ated by click ing on “ Stop Detec t Bad Block ” . RAID Management 3.4 .2 F rom the Storage categor y , c hoose the RAID M anagement item and the RAID Management screen appear s. This screen list s the RAID volumes currently residing in the Thecus IP storage. F rom this s cree[...]

  • Page 36

    36 Chapter 3: Sy stem Administration Di sk N o. Number assig ned to the installed har d disks. Capacity (MB) Capacity of the instal led hard disks. Model M odel nu mber of the install ed hard disks. Status Status of the installed hard disks. Used If this is check ed, current hard disk is aalready par t of a RAID volume . Spare If this is check ed, [...]

  • Page 37

    37 Chapter 3: Sy stem Administration In a multiple R AID conguration, one RA ID volume must be designated as th e Maste r RAID volume. The M aster R AID volum e will s tore all installed modules. I f the Master RAID is changed to another loc ation (i.e. assigning volume 2 to be the Master R AID volume after volume 1 had been previously assigned)[...]

  • Page 38

    38 Chapter 3: Sy stem Administration Please keep your USB disk in a safe place and also backup the encr ypte d k e y. Th ere is no wa y to rescu e data back if th e key is lost. With R AID volume encr yption enabled, the system per formance will go down. RAID volumes with encr ypt ion enabled w ill be displayed with a k ey lock symbol ne xt to volu[...]

  • Page 39

    39 Chapter 3: Sy stem Administration P ress “ Ye s ” for R AID volume creat ion preparation. Then click “ Finish ” to star t up with RAID 1 0. volume building. Building a RAID volume may be time consuming, depending on the size of hard drives and R AID mode. In general, if the R AID volume building process is up to “RAID Building ” , th[...]

  • Page 40

    40 Chapter 3: Sy stem Administration Level Model JBOD RAID 0 RA ID 1 RAID 5 RAID 6 RA ID 10 N2520/ N2560    N4520/N4560       RAID configura tion is usually required only when you first se t up the de vice. A br ief des cription of each RAID setting fol lows: RA ID Le vels Level Description JBOD The st orage vol ume is [...]

  • Page 41

    41 Chapter 3: Sy stem Administration[...]

  • Page 42

    42 Chapter 3: Sy stem Administration Remove R AID • Click to remove the R AID volume . All user data and iSCSI crea ted in the selec ted RAID volume wil l be deleted. To remove a RAID volume, follow the steps b elow : On the RAID List screen, select the RAID volume by clic k ing on its radio button, and cli ck RAID 1 . Infor mation to open the RA[...]

  • Page 43

    43 Chapter 3: Sy stem Administration Migrating a RA ID (Dose not apply to the N2520/N2560 ) • Once a RAID volume has been created, you may want to move it to other physical dri ves or change the R AID array a ll tog ether . T o m igrat e a RAID 1, RAI D 5 or RAI D 6 volume, follow the steps below : F rom the R AID Configuration screen, click M i[...]

  • Page 44

    44 Chapter 3: Sy stem Administration Migrating a R AID volume could tak e several hours to complete. • The RAID migration feature is available only when it is congurable. • Here is a list of limitation with RAID leve l migration function : During RAI D le vel m igration, it is not permitted to reboo t or shutdown system. 1 . Fo r RAID migrat[...]

  • Page 45

    45 Chapter 3: Sy stem Administration NAS Stacking (N4520/N 4560 Only) 3.4 .3 The Thecus IP storage ’ s cap acity can b e expande d even fur ther using the stack able func tion. With i t, users c an expand the capacit y of their net work storage s ystems up to 5 other s tack t arget volumes which are loc ated in different s ystems. These can b e [...]

  • Page 46

    46 Chapter 3: Sy stem Administration Nex t, input the target IP address of the s tack able de vice and click the Discover y button. The system will list available target volume s fro m the input ted IP addr ess. Once the volume IP has b een set , you may nee d to input a valid user name and p assword to validate your access r ight s . I f there is [...]

  • Page 47

    47 Chapter 3: Sy stem Administration F rom the figure above, the Stack ed T arget name i s “ pmmeeting” . The figures below show the result before and after via M icr osof t N et work A ccess w hen set ting s have been completed . The Browseable setting is the same me thod us ed for setting a sys tem share folder . I t desig nates whether or [...]

  • Page 48

    48 Chapter 3: Sy stem Administration The Public setting will be set the same way as the set ting for the system share folder associated with the ACL per mission is . If Pu blic is set to Y es, all users will be able to access it, and ACL button will be gray ed out. I f Publ ic is set to No , the A CL button will be available in the Stack T arge t L[...]

  • Page 49

    49 Chapter 3: Sy stem Administration With this new ly att ached stack t arget dev ice, you will see the infor mation displayed and also have access to s everal op tions to choose from . In general, if the at tached stack target device has been used by an other Thecus NAS as stack target volume , then the F ormat item will be display and system w il[...]

  • Page 50

    50 Chapter 3: Sy stem Administration D . Stack T arget ACL If the stack target Public setting set to Ye s , then the ACL button will be grayed out. However , if P ublic setting is se t to No , then the ACL button wil l be av ailable for you to setup user acce ss per mission s for the stack tar get. The ACL setting s wi ll be ex actly the sa me as t[...]

  • Page 51

    51 Chapter 3: Sy stem Administration ISO Image Mounting (N4520/N4560 Only) 3.4 .4 The ISO I mage M ounting feature is a ver y usef ul to ol f rom the Thecus product s. With it , users can mount an ISO file and hav e the expor t name display all the de tails f rom the mo unt ed I SO fil e. F rom the Control Panel , the IS O Image Mounting feature [...]

  • Page 52

    52 Chapter 3: Sy stem Administration T o mount the ne w ISO file, selec t one file from the lis t of file s and inp ut the desired mounting name into the “ Mount as: ” field. Click “ ADD ” t o confir m the completion o f the mounting. I f nothin g i s inp ut in the “ Moun t as ” ISO file expor t name field , the system will autom[...]

  • Page 53

    53 Chapter 3: Sy stem Administration iSCSI (N4520/N4560 Only) 3.4 .5 Y ou may spec ify the spa ce allocated for iSCSI. Se e the table below to the allowed iSCSI target num- See t he table below to the allowed iSCSI target num- S ee the table below to the allowed iSCSI target num- iSCSI t arget num- num - ber per system : Model N4520/N4560 Allow ed [...]

  • Page 54

    54 Chapter 3: Sy stem Administration The Create iSCSI V olume scree n appears. Create i SCSI V olume Item Description iSCSI T arget Volume Enable or Disable the iSCSI T arget Volume . T arget Name Name o f the iSCSI T arget. This name will b e used by the S tack able NAS func tion to identif y this ex - por t share. iqn_ Ye a r Selec t the cur rent[...]

  • Page 55

    55 Chapter 3: Sy stem Administration The iSCSI target volume creation will associate at least one L UN together . It can be assigned either “ Thin-Pro visioning” or “Inst ant Allocation ” . Enable the iSCSI T arget Vol ume by selec ting Enable. 2. Enter a T arget Name. This will be use d by the St ack able NAS func tion to identif y this ex[...]

  • Page 56

    56 Chapter 3: Sy stem Administration Expand V olu me • The iSCSI vol ume is now able to expand it s capacity from unused space (Instant Allocation mode only). F rom the volume list , simply selec t the iSCSI volume you like to expand and click the Expand button: Y ou wil l then see the d ialog box displayed b elow . Drag the Expand Capa cit y bar[...]

  • Page 57

    57 Chapter 3: Sy stem Administration Delete V olu me • To delete volume on the cur rent RAID volume, follow the steps below : Under the Volume Allocation List, click D elete . 1 . The Sp ace Alloc ation screen appears . P ress YES. All data in the volu me wil l be removed . 2. iSCSI Thin-Pr ovisioning • If i SCSI Thin-Provisioning is selec ted [...]

  • Page 58

    58 Chapter 3: Sy stem Administration volume is available from the list. Please ref e r to the screensho t below. If creating an iSC SI t arget volume under “Instant A llocation ” , physic al memor y i s as sign to the target , being limited by the available memor y . F or the iSCSI target volume creat ed under “ thin-provision i n g ”, vir [...]

  • Page 59

    59 Chapter 3: Sy stem Administration Nex t, input “ Initiator iqn ” and setup iSCSI target volume ac cess privilege s fro m the av ailable list . A pply by click ing the OK button. The ac cessible I nitiator will be listed as shown in the screen shot displaye d below . The listed “ Initiator iqn ” c an be modified or deleted by select ing [...]

  • Page 60

    60 Chapter 3: Sy stem Administration iSCSI CRC /Checksum T o enable this option, the initiator c an connec t wi th “ Data digest ” and “ Header digest ” . Max Con nec tions The maximu m number of iSC SI connec tions . Error Recover y Level The Error R ecover y Level (ERL) is negot iated during a leading iSCSI connec tion login in t radition[...]

  • Page 61

    61 Chapter 3: Sy stem Administration F ile Sharin g/Privilege 3.5 The Thecus IP storage has built-in user dat abase that allows administr ators to manage user ac cess using different gr oup policies. F rom the F ile Sharing/Privilege menu, you can crea te, modify, and de - F ile Shar ing/Privilege menu, you can create, modify, and de - menu, you c[...]

  • Page 62

    62 Chapter 3: Sy stem Administration AD Domain Ex ample Item I nformation Work Group / D omain Name domain ADS Suppor t Enable ADS S er ver Name Computer1 ADS Realm D omain.local Administra tor ID Administrator Administra tor Password *********** The DNS server spe cified in the W AN/LAN1 configuration page • should be able to correc tly resolve [...]

  • Page 63

    63 Chapter 3: Sy stem Administration All users are automatically assigned to the ‘ users’ gr oup. • Edit Users • Selec t an existing user f rom the Local User Configurat ion screen. 1 . Click on the Edit button, and the L ocal User Setting screen appea rs. 2. F rom here, you can enter a ne w pass word and re - enter to confirm, or use the[...]

  • Page 64

    64 Chapter 3: Sy stem Administration Local Group C onguration 3. 5.3 F rom the File Sharing/Privilege c ategor y, choose the Group item, and the Local Group Configura tion screen appe ars. This sc reen allows you to Add, Edit, and R emove loc al groups. Local Group Conguratio n Item Description Add P ress the Add button to add a user to the [...]

  • Page 65

    65 Chapter 3: Sy stem Administration Edit Group s • On the Local Group Configurati on screen, select a group name from the list. 1 . P ress the E dit but ton to modi fy the members in a gr oup. 2. T o add a user into a group, selec t the user from the Users Lis t, and press the << button to 3. move the user into the Members List. T o remov[...]

  • Page 66

    66 Chapter 3: Sy stem Administration Shared F older 3.5 .5 F rom the Fi le Sharing /P r ivilege categor y , cho ose Shared Folder , and the Shared Folder screen ap - F ile Sharing/ P r ivilege categor y , choo se Shared Folder , and the Shared F older screen ap - ca tegor y , choos e Shared Folder , and the Shared F older screen ap - Shared Folder [...]

  • Page 67

    67 Chapter 3: Sy stem Administration you to change folder information. Af ter en tering the information, press Apply to save your changes. Modify Folder Item Description F older Name Enter the name of the folder . Public Admit or deny public access to this folder . Apply Pr ess Apply to create the folder . Remove F older s • To remove a folder , [...]

  • Page 68

    68 Chapter 3: Sy stem Administration NFS Share • T o allow NFS acc ess to t he share folder , enable the NFS S er vice, and t hen se t up hosts wi th access rights b y click ing Add. NFS Sh are Item Description Hostname Enter the name or IP address of the host Privil ege Hos t has eit her read only or wr iteable access to the folder . OS Suppor t[...]

  • Page 69

    69 Chapter 3: Sy stem Administration Samb a Congurati on • On the F older screen, press the Samba but ton and the S amba Configuration s creen appear s. This screen allows you to setup samba c onfiguration for assoc iated folder . Af ter entering the informa tion, press Apply to ac tivate input settings. Samba Conguration Item Description[...]

  • Page 70

    70 Chapter 3: Sy stem Administration A CL setting Item Description Deny Denies ac cess to us ers or grou ps who are displayed in this c olumn. Read Only P rovides R ead Only access to users or groups who are displayed in this c olumn. Writable Provides Write access to users or groups who are displayed in this column. Recursive Enable to inherit the[...]

  • Page 71

    71 Chapter 3: Sy stem Administration The ACL can only be se t for share and sub- folders level, not for les. The ACL screen also allows you to s earch for a par ticular user . T o do this, follow the steps below : In the b lan k , enter the name of the user you would lik e to find. 1 . F rom the drop down select the grou p you would like to sea[...]

  • Page 72

    72 Chapter 3: Sy stem Administration User and Group Back up 3. 5.7 The user and group b ackup feature allow sy stem user s and groups to be back ed up to an other location and be res tore d if needed. Ple ase no te, when resto rin g previous b ackup users and groups, the cur rent users and groups lis t will be replaced from t his r esto re fi le ?[...]

  • Page 73

    73 Chapter 3: Sy stem Administration LDAP Suppor t (N4520/ N4560 Only ) 3. 5.8 The LDAP is another way to authenticate login users w ho have joined the LDAP ser ver . Y ou will need to fill in the LDAP ser ver informa tion to get LDAP authentic ation st ar ted. Please mak e sure that the LDAP ser ver has a Samba sa m and a POSIX Ob jectClass accou[...]

  • Page 74

    74 Chapter 3: Sy stem Administration Network S er vice 3. 6 Use t he Net work Ser vic e c ategor y to mak e net work ser vic e suppor t sett ings. Samba / CIFS 3.6 .1 There are op tions allow Admin to Enable/Disable to operate Thecus IP storage ass ociated with Samba / CIFS protocol . With the option changed , it will need to reboot system to activ[...]

  • Page 75

    75 Chapter 3: Sy stem Administration The Thecus IP stora ge is supp or ted rec ycle bin via SMB /CIFS protoc ol. Simply enable the “Rec ycle Bin ” f unction and “Rec ycle F older Display ” then all of deleted files/ folders will reside in the “_N AS_Re cycle _(Associate d RDID V olume)” share folder . F or e xample, the sy stem has cre[...]

  • Page 76

    76 Chapter 3: Sy stem Administration AFP (Apple Network Se tup) 3.6 .2 F rom the Networ k S er vice categor y, choose the A FP item, and the A FP Suppor t sc reen appe ars. This screen displays the c onfiguration items for the Apple Fi ling Protocol. Y ou can change any of these items and press Apply to confirm your set tings. A de scription of e[...]

  • Page 77

    77 Chapter 3: Sy stem Administration FTP 3.6 .4 The Thecus IP storage can ac t as an FTP ser ver , enabling us ers to download and upload files wi th their f avorite FT P programs. F rom the Net work S er vice ca tegor y, choo se the FT P i tem, and the FTP screen appe ars. Y ou can change any of these items and press Apply to c onfirm your sett [...]

  • Page 78

    78 Chapter 3: Sy stem Administration A de scription of each item follows: T FTP Item Description TFTP Enables T FT P Ser vice on t he Thecus IP storage . NICs Checked W AN/L AN1 or LAN2 to enable por t use Por t Specifies the por t number of an incoming connec tion on a non-standard por t. Share Folder Selec t the file stored folder, it cann ot b[...]

  • Page 79

    79 Chapter 3: Sy stem Administration Disable HT TP suppor t and Enable Secure HT TP support to guarantee secure access . UPnP S er vice 3 .6.7 This device suppor ts UPnP Media ser ver, which allows us ers to play media files with UP nP client ( ex. DMA devic es). Enable or disable Universal Plug and Play protocol. UPn P helps to find the IP addre[...]

  • Page 80

    80 Chapter 3: Sy stem Administration DDNS 3. 6.1 0 T o se t up a ser ver on the I nternet and enable the users to c onnect to it easily, a fixed and e asy-to remember hos t name is of ten requir ed. However, if the ISP provides only dynamic IP address, the IP address of the ser ver will change from time to t ime and is difficult to recall. Y ou ca[...]

  • Page 81

    81 Chapter 3: Sy stem Administration UPnP P or t Management 3 .6.1 1 One o f the mos t conven t way to allow user s to acc ess required ser vices such as FTP , SSH, web disk and http etc. f rom Inter net environment is set ting UPn P por t management . T o se t up this UPnP por t forw arding feature, please be sure that the router has “ UPn P Ser[...]

  • Page 82

    82 Chapter 3: Sy stem Administration We b D AV 3 .6. 12 The W ebDA V is an ex tended protoc ol of http( s) which allows remote access to your NAS s ystem. T o be gin using W ebDA V and WebD A V SSL , simply click enable and provide the por t number . The default por t num ber is 9800 , unde r normal ci rcumstances this wil l not need to be chan ged[...]

  • Page 83

    83 Chapter 3: Sy stem Administration ThecusID 3.6 .1 4 Creating a Thecus ID w ill give you full access to all that Thecus has to offer . Af ter creating a Thecus ID , you‘ll receive a f ree* DDNS (i.e“ yourname.thecuslink .com ” .) Y ou can use your DDNS to easily ac cess your NAS, make use of the mobile T - On TheGo™ app, and share links [...]

  • Page 84

    84 Chapter 3: Sy stem Administration If you don ’t have a Thecus ID, click “Register ” and the screen below will appe ar . Please fill in the required information and click Apply . Register Thecus ID Item Description Thecus ID Input a valid email address. It will require conrmation to activate your Thecus ID . Password Input the password f[...]

  • Page 85

    85 Chapter 3: Sy stem Administration Application Ser ver 3. 7 The Thecus IP storage supp or ts built-in application such as iTunes ser ver as well as a dd-on official or third -p ar t y app lications. iT unes® S er ver (Built in) 3. 7.1 With the built-in iT unes ser ver capabilit y , Thecus IP stor age enables digital music to be shared and played[...]

  • Page 86

    86 Chapter 3: Sy stem Administration Add-on O cial Applications 3. 7.2 There are sever al default pre -loade d official applications such as WebDisk, Piczz a (Photo ser ver ) and T ra nsm iss ion- Kit (BT d own load ma nag er) th at ca n be fou nd fr om t he Ap pli cati on Se r ve r cate gory . 3rd par ty App Installation 3. 7.3 F rom the Applic[...]

  • Page 87

    87 Chapter 3: Sy stem Administration Backu p 3. 8 The re ar e a num ber of ways to ba ck up data w ith the Thecus IP s torage . Rsync T arget Ser ver 3 .8.1 When it come s to back ing up your da ta, it ’ s ver y impor tant to have flexibility. Data guard provides you with many options, including full back up for all shares, custom back up for se[...]

  • Page 88

    88 Chapter 3: Sy stem Administration Remote Data backup Item Description Add Add new task . Edit Edit selec t t ask. Remove Remove selec t task Star t If associated task has been setup in schedule and like to star t at once, click on to star t task right aw a y. Stop Stop the asso ciated running task. The other scenar io is if a task has been setup[...]

  • Page 89

    89 Chapter 3: Sy stem Administration Remote Data backup Item Des cription F ull Backup The “ F ull back up ” will have all shares from source backup to destination. I t could also create shares automatically f rom destination if it is not existent. This only appl ies if the target ser ver is the s ame model as the sour ce. Custom Backup The “[...]

  • Page 90

    90 Chapter 3: Sy stem Administration F ull B ackup • Click on full back up and the se tup screen appear as below. F ill in the remote target IP (De stination) and port (need to be change d only if this por t is already in use). If encr yp tion is required then enable it. Please mak e sure the associated target ser ver also has encr ypt ion enable[...]

  • Page 91

    91 Chapter 3: Sy stem Administration -F ill out all the necessar y details and choose your parameters Add Rsync B ackup T ask Item Description T ask Name This is how this task will appear in the task list . Backup T ype Real time: I t w ill backup folder s/files from source to target on the fl y . On the other hand, any changes f rom the s ource [...]

  • Page 92

    92 Chapter 3: Sy stem Administration F rom the task lis t, you can now s ee the ne wly added task “ fullb ack01 ” . The back up is setup as “ real time ” . F rom the status field, “ P rocessing ” can be read as the back-up is per formed on the fly . Custom Backup • The custom b ackup se tting is similar to the full back up. The only[...]

  • Page 93

    93 Chapter 3: Sy stem Administration Click “ Nex t ” and more setting app ear s . Th ese ar e the as t he set tings for “ F ull backup ” 3. Click “ F inish ” and the data guard task will ap pear in the list as show n below. 4. F rom the task list , you can now se e the newly added “ customback01 ” . This back up is setup as “ sche[...]

  • Page 94

    94 Chapter 3: Sy stem Administration iSCSI Backup • If the source unit contain s iSCSI volume, it can be back ed up t o the t arget uni t as a single file. The proc edure is the same as for t he pre vious “ F ull b ackup ” and “ Custom back up ” , selec t “ iSCSI backup ” from data guar d wizard. Inputs the share folder name of the t[...]

  • Page 95

    95 Chapter 3: Sy stem Administration 4. Click “ F inish ” and the data guard task will appea r in the list as sho wn below. F rom the task list , you can now see the newly added “ iscsiback ” . This backup is setup as “ schedule ” . The source folder name will use iSCSI_+target volume name. So here it is displayed as “ iSCSI_pmtest ?[...]

  • Page 96

    96 Chapter 3: Sy stem Administration This is a useful feature if the sy stem configuration ne eds to be re store d to a brand new unit . L e t ’s g o thru the following ex ample to see how it works . The original source system has 3 RAID volume , “ R AID ” , ‘ R AI D10 ” and “ RAID 20 ”, and has back ed up the system configuration s[...]

  • Page 97

    97 Chapter 3: Sy stem Administration Click “ Nex t ” and a screen wil l app ear as show n below . I t has the listed available sy stem 3. configuration backup file s . Select the one you want and click nex t. Y ou also have the option to downloa d the current s ystem c onfiguration before restor ing fr om the backup file. Af ter click ing ?[...]

  • Page 98

    98 Chapter 3: Sy stem Administration T he backup configuration has different numbers of RAID volume than the curren t sy ste m (3 5. vs 1). I t can be k ept as the RAID volume mapping arranged by t he system , then car r y on to click “ F inish ” . This me ans that all 3 RA ID volumes configuration such as share folder etc. will all rest ore[...]

  • Page 99

    99 Chapter 3: Sy stem Administration Data Guar d (Local Backup) 3.8 .3 The Thecus product provides c omplete backup solution bet ween Thecus NAS s ystems as well as bet ween folders of local s ystem s . Remote Data backup Item Description Add Add a new task. Edit Edit selec t ed task . Remove Remove selec t ed task . Star t C lick on star t to star[...]

  • Page 100

    100 Chapter 3: Sy stem Administration Local Data backup Item Description Impor t This is associated with ex ternal device s which are added to the system such as USB disk. Yo u can sele ct a folder f rom an ex ternal de vice and impor t it to t he NAS as a share folder . Copy Copy folder to folder or NAS folder to ex ternal device or exter nal de v[...]

  • Page 101

    101 Chapter 3: Sy stem Administration impor t ed them to the NAS under the RAID60volume. Nex t, please selec t the path from the drop down list to save the log. Also , give the access permission whether these selecte d folders will be “ Public ” or no t af ter the impor t. Read the no tes and check the “ Accept ” box for confi r mation. I [...]

  • Page 102

    102 Chapter 3: Sy stem Administration N o w, you will see in the data guard task list that you have cr eated a t ask . And th at the sy stem ha s created 2 ne w share folders from the task jus t crea ted. Copy : click on “ Copy ” and this screen appea r s. 2. 3 di fferent op tions c an be s elected, folder to folder , folder to ex ternal dev i[...]

  • Page 103

    103 Chapter 3: Sy stem Administration F older to F older • F ol der t o exter nal devic e • External device to Folder •[...]

  • Page 104

    104 Chapter 3: Sy stem Administration Let ’ s tak e “ Folder to E xter nal de vice ” as an e xample. I n the s ource pan e , s elect the d esired R AID volume and its associated folder list will appe ar ; same method i n the t arget pa ne for the associated ex ternal de vice. Selec t a folder f rom the so urce pan e which is going to be c opy[...]

  • Page 105

    105 Chapter 3: Sy stem Administration Read the note s and check the “ Accept ” box for con firmation. N o w, you will see in the data guard task list that you have cr eated a t ask . Realtime Back up: click on “ Realti me Backup ” and this scree n wil l ap pear . 3. 2 di fferent options can be selec ted fr om , folder to folder , folder t[...]

  • Page 106

    106 Chapter 3: Sy stem Administration Nex t, fill in the task name and related settings.[...]

  • Page 107

    107 Chapter 3: Sy stem Administration Realtime Backup Item Description T ask Name Input the task name, length limited to 4~ 12 charac ters . Sync T ype Selec t “ I ncremental ” or “ Synchronize ” . Back up Symb olic Link Choose to back up symbolic link which is included in the source. Fil t e r The filter can be set to be execut e d only i[...]

  • Page 108

    108 Chapter 3: Sy stem Administration Schedule Back up: click on “ Schedule B ackup ” an d this screen w ill. 2 differen t choices can be 4. selec ted fro m , folder to folder , folder to ex ternal dev ice. Let ’ s use “ F older to Ex ternal device ” backup for our example. F rom the NAS volume RAID in the S ource pane select the folder [...]

  • Page 109

    109 Chapter 3: Sy stem Administration Read the note s and check the “ Accept ” box for con firmation. N o w, you will see in the data guard task list that you have cr eated a t ask . iSCSI Back up: click on “ iSCSI Ba ck up ” and scr een appear as below . 5. It can be backup to t wo diffe rent storage pool, iSCSI to fold er , iSCSI to ex [...]

  • Page 110

    110 Chapter 3: Sy stem Administration Let ’ s take exam ple to have “ iSCSI to F older ” backup, from existed iSCSI volume “ iSCSI_iscsiv502 ” to volume RAID folder “ andy_local ” . The source pane lis ted “ iSCSI_iscs iv502 ” and “ iSCSI_is csiv50 ” where are iscsi volume has e xisted in this system with name “ iSCSI_+iscsi[...]

  • Page 111

    111 Chapter 3: Sy stem Administration task list will have created task listed. T o st ar t the iSCSI volume back up , selec t the task and click “ St ar t ” from task bar . Once “ Start ” click , the associated iSCSI volume will not allow to I/O during backup processing . And the t ask s tatus w ill change to ‘ P rocessin g ” . States c[...]

  • Page 112

    112 Chapter 3: Sy stem Administration iSCSI Import: click on “ iSCS I I mport ” and screen appear as below . 6. It can be impor ted from t wo different storage pools , folder to iSC SI or ex ternal dev ice to iSCSI. I t is depend on where iSCSI volume has b ackup to . Let ’ s t ake e xample to impor t “ RAID folder to iSCSI ” which is th[...]

  • Page 113

    113 Chapter 3: Sy stem Administration Nex t, provide where the task log will store. Reading the note and check on “ Accept ” for confirma tion. Now , from the data guard task list will ha ve created task listed . A CL Backup and R estore 3.8 .4 The ACL b ackup and restore feature enables the system ACL (Access Control List) to be back ed up on[...]

  • Page 114

    114 Chapter 3: Sy stem Administration F or the ACL res tore , it can be restored in the same system or used in an other unit. F or e xample, l e t ’s rest ore th e ACL backu p file to an other unit. This unit has a RAID volume “ RAIDpm ” with share folder s as listed on right ha nd screen shot. Af ter input ting the ACL back up f ile and cli[...]

  • Page 115

    115 Chapter 3: Sy stem Administration Data Bu rn 3.8 .5 The data burn is featured to suppor t 3 different modes o f data burning for files/folders to and from image file and physical optical disk . The 3 different modes are “ Write F iles/folder s to disc ” , “ Wr ite ima ge to disk ” and “ Write files/ folders to image ” . Write F[...]

  • Page 116

    116 Chapter 3: Sy stem Administration Selec t f rom the installed USB bur ning devic es. Ple ase click t h e “ detec t disc ” button to c. check the s tatus onc e the disc is inser ted. Selec t the burnin g speed from the drop down li st. d. Selec t whe ther disc data verifica tion is required or not. e. Click “ Burn ” to star t disc burni[...]

  • Page 117

    117 Chapter 3: Sy stem Administration Selec t the ISO file. b . Selec t f rom the installed USB bur ning devic es. Ple ase click t h e “ detec t disc ” button to c. check the s tatus onc e the disc is inser ted. Selec t the burning speed from the drop down l ist. d . Selec t whe ther disc data verifica tion is required or not. e. Click “ Bu[...]

  • Page 118

    118 Chapter 3: Sy stem Administration Input the path where the ISO file is going to be store d , you can press the “ Brow se ” c. button to have the share list appear . Inpu t the ISO file name for burned image file. d . Click “ Burn ” to start the ISO file burning. e. The data burn does not suppor t rewr iteable media i f it has been b[...]

  • Page 119

    119 Chapter 3: Sy stem Administration W indo ws XP SP2 • T o set up the P r inter S er ver in Windows XP SP2, follow the steps below : Connect the USB printer to one of the USB por ts (preferably the rear USB por ts ; f ront USB 1 . por ts can be used for ex ternal HDD enclosures). Go to Star t > P rinters and F ax es. 2. Click on F ile > A[...]

  • Page 120

    120 Chapter 3: Sy stem Administration Selec t Add a net work , wireless or Bluetooth pr inter . 3. Selec t The printer that I want isn ’t listed. 4. Y ou can press The printer that I w ant isn ’t lis ted to go into ne xt p age without waiting for Searching for av ailable printers to finish. Click Selec t a shared printer by name. 5.[...]

  • Page 121

    121 Chapter 3: Sy stem Administration T yp e ht tp:// <Thecus_NAS>: 631/printers/usb -printer in the box , where <Thecus_NA S_IP> is the IP address of Thec us IP stor age . Click Nex t. Selec t or install a printer and then press OK . 6. Windows w ill attempt to connec t to the printer . 7. Y o u can ch oose to set th is prin ter as th [...]

  • Page 122

    122 Chapter 3: Sy stem Administration Done! Click F inish. 9.[...]

  • Page 123

    123 Chapter 3: Sy stem Administration Uninterrupted P ower S ource 3.9 .2 F rom the Extern al Devices menu, choose the U ninterrup ted Power Source item and the UPS S etting screen appe ars. Mak e any changes you wish, and press Apply to confirm changes. See the following table for a detailed des cription of each item. UPS Setting Item Description[...]

  • Page 124

    124 Appendix A: Customer Suppor t Appendix A: C ustomer Suppor t  If you are still e xperiencing problems wi th your Thecus IP storage , o r require a R eturn M erchandise Authoriza tion (RMA), feel f ree to contac t te chnical suppor t via our T echnical Suppor t W ebsite: http: //w ww.thecus.com/sp _tech.ph p Customers in the US should send al[...]

  • Page 125

    125 Appendix B: RAID Bas ics Appendix B: RAID Basics  O ver v iew • A Redundant Ar ray of I ndependent Disks (R AID) is an ar ray of sever al hard disks tha t provide dat a securi ty and high per formance. A R AID s ystem acc esses se veral hard disks simultane ously , which improves I /O per for mance over a single hard disk . Data secur ity [...]

  • Page 126

    126 Append ix B: RAID Basi cs RAID 5 RAID 5 offers data se curity and i t is best suited for net works that per form many small I /O tr ansactions at the same time, as well as applications that require data securi ty such as office automation and on - line custo mer ser vice. Use it also for application s with hig h read requ ests but low write re[...]

  • Page 127

    127 Appendix B: RAID Bas ics listed bel ow : RA ID Leve l Per centage Used RAID 0 100% RAID 1 1/n x 100 % RAID 5 (n- 1)/ n x 10 0% RAID 6 (n-2)/n x 10 0% RA ID 10 50% JBOD 100 % n: HD D number[...]

  • Page 128

    128 Appendix C: Active Director y Basics Appendix C: A c tive Dir ec tor y Basics  O ver v iew • With Wind ows 2000, Microsof t introdu ced Active Director y (ADS), which is a large database/ information store. Prior to Ac tive Direc tor y t he Windows O S c ould not s tore a dditional infor mation in its domain database. Active Director y als[...]

  • Page 129

    129 Appendix D: Licensing Informat ion Appendix D: Lic ensing I nf ormation  O ver v iew • This product included c opyrighted third-par t y so ft ware licensed under the ter ms of GNU Gener al Pu blic Lic ense. Please see THE GNU Gener al Public License for ex tra ter ms and c onditions o f this license. Source Co de Av ailabilit y Thecus T ec[...]

  • Page 130

    130 Appendix D: Licensing Informat ion C GIC L icense T erms • Basic License CG IC, copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004 by Thomas Boutell and Boutell . Com, I nc. P er mission is granted to use CGIC in any application, commercial or noncommercial, at no co st. HOWE VER, this copyr ight paragraph must appear on a “ cre[...]

  • Page 131

    131 Appendix D: Licensing Informat ion the recipients all the r ights that you have. Y ou must make sure that they, too, receive or can get the so urc e code . An d yo u mu st s how t hem t hes e term s so t hey know thei r rig hts . We protect your rights with two steps: (1) copyr ight the sof t ware, and (2) offer you this license which gives yo[...]

  • Page 132

    132 Appendix D: Licensing I nformation warr ant y pro tect ion in exchange for a fe e. 2. Y ou may modify your copy or copies of the P rogram or any por tion of it , thus forming a work based on the Program, and copy and distribute such modifications or wor k under the ter ms o f Sec - tion 1 above, provide d that you also meet all of these condit[...]

  • Page 133

    133 Appendix D: Licensing Informat ion ware interchange; or , b) Accompa ny it with a written o ffer , valid for at least three years, to give any third part y , for a charge no more than your cos t of physically per forming source distr ibution, a complete machine - readable copy of the cor responding source code, to be dis tributed under t he te[...]

  • Page 134

    134 Appendix D: Licensing Informat ion 7. If, as a cons equence of a cour t judgment or allegation of patent infr ingement or for any other reason (not limited to pa tent issues), c onditions are imposed on you (w hether by cour t order , agree - ment or other w ise) tha t contr adict the condi tions of this L icense, the y do not excuse you f rom [...]

  • Page 135

    135 Appendix D: Licensing Informat ion riv atives o f our free sof t ware and o f promot ing the shar ing and reuse of sof tw are generally . NO W ARRANT Y 11. BEC A USE THE PRO GRAM IS LICENSED FREE OF CHAR GE, THERE IS NO W ARRANT Y FOR THE PROGRAM, TO THE EXTENT PERMIT TED BY APPLI CABLE LA W . EXCE PT WHEN O THER WISE ST A TED IN WRITING THE CO[...]