Origin Storage Thecus N4560 инструкция обслуживания

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135

Идти на страницу of

Хорошее руководство по эксплуатации

Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации Origin Storage Thecus N4560. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции Origin Storage Thecus N4560 или обучающее видео для пользователей. Условием остается четкая и понятная форма.

Что такое руководство?

Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции Origin Storage Thecus N4560 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.

К сожалению немного пользователей находит время для чтения инструкций Origin Storage Thecus N4560, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.

Из чего должно состоять идеальное руководство по эксплуатации?

Прежде всего в инструкции Origin Storage Thecus N4560 должна находится:
- информация относительно технических данных устройства Origin Storage Thecus N4560
- название производителя и год производства оборудования Origin Storage Thecus N4560
- правила обслуживания, настройки и ухода за оборудованием Origin Storage Thecus N4560
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам

Почему мы не читаем инструкций?

Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск Origin Storage Thecus N4560 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок Origin Storage Thecus N4560 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта Origin Storage, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания Origin Storage Thecus N4560, как это часто бывает в случае бумажной версии.

Почему стоит читать инструкции?

Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства Origin Storage Thecus N4560, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.

После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции Origin Storage Thecus N4560. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.

Содержание руководства

  • Страница 1

    U ser ’ s Manual N2520/N2560/N4 520/N4560 Series[...]

  • Страница 2

    ii Copyright and T r ademark No tice C opyright and T r ademark Notice  Thecus and other name s of Thecus produc ts are registered trademar ks o f Thecus T echnolog y Corp. Microsof t, Windows, and the Windows lo go are registered trademarks o f Microso ft Cor poration. Apple, i T unes and Apple OS X are registered trademar ks of A pple Computer[...]

  • Страница 3

    iii Safet y Warnings Safety W arnings  F or your sa fety, please read and follow the following safet y w arnings: Read this manual thoroughly before attempting to set up your Thecus IP stora ge . ¾ Y our Thecus IP storage is a complicated elec tronic device. DO NOT at tempt to re - Thecus IP storage is a complicated elec tronic device. DO NOT a[...]

  • Страница 4

    iv T able of Contents T able of C ontents  C opyright and T rademark Notice . ............................................... ii About This Manual. ...................................................................... i i Limited W arran t y . ........................................................................ i i Sa fet y W arnings. .....[...]

  • Страница 5

    v T able of Contents 3.3.13 F actor y De fault. .......................................................................................................... 2 7 3.3.14 Po wer Management. ................................................................................................ 28 3.3.15 F ile System Check . .....................................[...]

  • Страница 6

    vi T able of Contents 3.6.13 Auto Thumbnail. ........................................................................................................ 82 3.6.14 ThecusID. ...................................................................................................................... 83 3.7 Application Ser ver . ................................[...]

  • Страница 7

    vii Chapter 1: I ntroduction Chapter 1: Intr oduc tion § Over view 1 .1 Thank you for choosing the Thecus IP Storage Ser ver . The Thecus IP storage is an easy-to -use storage ser ver that allows a dedica ted approach to stor ing and distr ibuting data on a net work . Data reliabil - it y is ensured with RAID features tha t provide data securit y [...]

  • Страница 8

    viii Chapter 1: I ntroduction F ront Panel 1 .3 N2520/N2560: • The Thecus N2520/N2560 ’ s front panel shows the de vice’ s indicators and hard disk inst all slots: Fr ont P anel Item Description 1. HDD1 LED Blinking white: HD D activity Red: HDD failu re 2. HDD2 LED Blinking white: HD D activity Red: HDD failu re 3. LAN LED Solid white: LAN C[...]

  • Страница 9

    ix Chapter 1: I ntroduction N4520/N4560: • The Thecus N4520 /N4560 front p anel show s the de vice’ s indicator s, s ystem informa tion and hard disk tray s: Fr ont P anel Item Description 1. Power LED Solid blue: Power on 2. System statu s Blinking orange: Diagnostic mode k ick-in Solid orange: Diagnostic c ompleted 3. LAN LED Gr een : Net wor[...]

  • Страница 10

    x Chapter 1: I ntroduction Rear Panel 1 .4 N2520/N2560: • The N252 0/N2560 rear pan el features por ts and connectors . Back Panel Item Description 1. System F an System fan that exhausts heat from the unit. 2. HD MI F or Video/ Audio out 3. SPDIF For Audio out 4. LAN Po r t LAN por t for conne cting to an Etherne t net work through a switch or a[...]

  • Страница 11

    xi Chapter 1: I ntroduction N4520/N4560: • The N4520/N4 560 rear pane l features por ts and connectors . Back Panel Item Des cription 1. System F an Sy stem fan that exhausts heat from the unit. 2. USB Por ts USB 2.0 por t for compatible USB de vices, such as digital cameras, USB disks, and USB pr inters. 3. LAN P or t L AN por t for connec ting [...]

  • Страница 12

    12 Chapter 2: Hardware I nstallation Chapter 2: Har dware Installation § O ver v iew 2. 1 Yo u r Thecus IP s torage is designed for easy installation. T o help you ge t st ar ted, the following chapter will help you quick ly ge t your Thecus IP stor age up and running. Please read it c arefully to pre vent damaging your unit during inst allation. [...]

  • Страница 13

    13 Chapter 2: Hardware I nstallation P ress the power button on the F ront P anel to boot up the Thecus IP storage . 3. N2520/N2560 pow er button S N4520/N4560 power button S[...]

  • Страница 14

    14 Chapter 3: Sy stem Administration Chapter 3: S yst em Administr ation § Over view 3 .1 The Thecus IP storage provides an easily acce ssible Web Administration I nter face. With it, you can configure and moni tor the Thecus IP s torage any where on the net work . W eb Admin istration Inter f ace 3. 2 Mak e sure your net work is connec ted to th[...]

  • Страница 15

    15 Chapter 3: Sy stem Administration Add Shor tcut 3. 2.1 The user inter face wi th “ Add Shor tcut ” shor tcut allows the user to designate o ften use d items and have them display on the main screen area. The figure below displays sy stem add shor tcut funct ions. Administr ator s c an add or remove add shor tcut func tion s to M y F avorite[...]

  • Страница 16

    16 Chapter 3: Sy stem Administration Message Bar 3. 2.3 Y ou can ge t quick information about your sys tem status by moving your mouse over these icons. Me ssage Bar Item Status Description RAID M anagement Display the s tatus of created RAID volume. Click to go to RAID Management page a s shor t cut. Disks I nformation Display the status of disks [...]

  • Страница 17

    17 Chapter 3: Sy stem Administration Language S elec tion 3 .2.6 The Thecus IP stora ge suppor ts multiple Languages, including: English  Japanes e  T radi tional Chinese  Simplified Chinese  F rench  German  I talian  K orean  Spanish  Russian  Po li s h  P or t uguese  On the menu bar , click L anguage and t h[...]

  • Страница 18

    18 Chapter 3: Sy stem Administration Sy stem/ Ser vice Status 3.3 .2 F rom the System Management categor y,, choose the Status item, S ystem S er vice Status and HW S ta- tatus ite m, System Ser vice Status and HW Sta- item, System Ser vice Status an d HW Sta- Ser vice Status and HW Sta- and HW Sta- HW Sta- Sta - tus sc reens appear . These screens[...]

  • Страница 19

    19 Chapter 3: Sy stem Administration Expor t log option This can be set to A uto Export or Aut o Delete . Log Type The def ault logs displayed are for system e vents. Fr om the dropdown list, administrators can choose from various forms o f user access, such as AFP , Samba, e tc. Note: Users need to enable the “User Access Log ” ser vice to vie[...]

  • Страница 20

    20 Chapter 3: Sy stem Administration Use r A ccess Log 3.3 .5 The Us er Acc ess Log Suppor t sec tion allows administra tors to selec t the desired protoc ols to record user activ ity for . User Access Log User Access Log Item Description User access log Enable or disable the User Access Log service. Folder Select from the dropdown list where to st[...]

  • Страница 21

    21 Chapter 3: Sy stem Administration T o e xpor t det ails f rom the User Acc ess Log as a single f ile from target folder, administrator s mus t first selec t the desired number of rec ords f rom the dropdown list and also selec t the “ Auto expor t ” option. Please choose the number of logs e xpor t and click “ Apply ” to acti vate the s[...]

  • Страница 22

    22 Chapter 3: Sy stem Administration Congura tion with syslog client and target to s tore remotely : • See the following table for a detailed des cription of each item: Syslog Management Item Description Syslog D aemon Enable/Disable syslog daemon . Syslog ser vice If S er ver has been selected then ass ociated syslog folder will be used to st[...]

  • Страница 23

    23 Chapter 3: Sy stem Administration Sy stem Monitor 3. 3.7 The sy stem monitor i s capable to monitor s ystem st atus includ ing C PU/memor y utilization, networ k throughput and on-line user list in var ious proto cols. T o monitor sy stem s tatus, simply click on “ System M onitor ” f rom the tree menu and the screen will appear as below . I[...]

  • Страница 24

    24 Chapter 3: Sy stem Administration F or the on- line user s list, sy stem monitor will display the on-line users and the share folder they have visited . System Moni tor Item Description Save Layout Saving selecte d monitoring items. Layout will remain the same for fu ture visits. Reset Layout Set back to default monitoring se ttings and layout .[...]

  • Страница 25

    25 Chapter 3: Sy stem Administration Date an d T ime : S etting system t ime 3.3 .8 F rom the Sy stem M anagement categor y , choos e the Date and Time item and the Date and Time screen appears. S et the de sired Date, Time, and Time Zone. Y ou can also elec t to s ynchronize the sys - tem time on Thecus IP stor age wi th an NTP (Net work Time Prot[...]

  • Страница 26

    26 Chapter 3: Sy stem Administration Scheduled On/O 3.3 .1 0 Using the The cus IP stor age Sy stem Management, you c an save energy and money by sche duli ng the Thecus IP stora ge to tu rn itself on a nd off duri ng certain ti mes of the da y. F rom the System Management categor y, choose the S cheduled On/ O ff item and the Scheduled On/ O ?[...]

  • Страница 27

    27 Chapter 3: Sy stem Administration Admi nistrator Password 3.3 .1 1 F rom the Sy stem Management categor y , choose the Administra tor Password item and the C hange Administrator P assword screen appears. Enter a new pass word in the New Password box and con - firm your new password i n the Confi rm Passwo rd box. Pr ess Apply to confirm passw[...]

  • Страница 28

    28 Chapter 3: Sy stem Administration Resetting to factor y def aults will not erase the data s tored in the hard disks, but WILL rever t all the settings to the f actor y def ault values P ower Management 3.3 .1 4 F rom the Sys tem Management categor y , choose P ower Management item, and the Shutdown/R e - boot System screen appears . Pre ss R ebo[...]

  • Страница 29

    29 Chapter 3: Sy stem Administration Once you click Nex t, you will see the following screen: Click Star t to begin the file system check. Click Reboot to reboot the s ystem. When the file sy stem check is running, the sy stem w ill show 20 lines of infor mation until it is com - plete. Once complete, the results will be shown at the bo ttom.[...]

  • Страница 30

    30 Chapter 3: Sy stem Administration The system must be rebooted before Thecus IP storage can func tion normally af ter le system check completes. W ak e -Up On LAN ( WOL) 3.3 .1 6 The Thecus IP stora ge has the abilit y to be awok en f rom sleep mo de via LAN por t . F rom the System Management c ategor y, choose the W OL item, and the W ak e -[...]

  • Страница 31

    31 Chapter 3: Sy stem Administration UI Login F unc tion 3.3 .1 8 Adjusts UI Login Configurati on se ttings, you can enable/disable t he W eb Disk , Photo S er ver an d modules f unctions, according to your nee ds. Network ing 3.3. 19 F rom the System M anagement cate gor y , choo se Net work ing, and the Net work ing C onfigur ation screen appears[...]

  • Страница 32

    32 Chapter 3: Sy stem Administration Netmask/Prefix Length I nput net mask for IPv4 and Pr efix len gth for IPv6. Gate way Gate way for associate NIC . Def ault gate way It can be chose n from a d r o p d o w n l i s t o f d e f a u l t g a t e w a y tha t’ s been used for the The cus IP storage. Only use Jumbo Frame se ttings when operating in[...]

  • Страница 33

    33 Chapter 3: Sy stem Administration Disks Information Item Description Di sk N o. Indicates disk location. Capacity Shows the SA T A hard disk capacity. Model Displays the SA T A hard disk model name. Firmware Shows the SA T A hard disk firmware version. Bad Block scan Y es to star t scan Bad Block. S.M.A.R.T . In formation • On the Disk I nfor[...]

  • Страница 34

    34 Chapter 3: Sy stem Administration S.M.A.R.T . Information Item De scription T r ay Number T ray the hard disk is inst alled in. Model Model name of the installed hard disk . Power ON Hours Count of hours in power-on st ate. T he r aw value of this attribute show s total count of hours (or min - utes, or seconds, depending on manufac turer) in po[...]

  • Страница 35

    35 Chapter 3: Sy stem Administration The bad block scan can be termin ated by click ing on “ Stop Detec t Bad Block ” . RAID Management 3.4 .2 F rom the Storage categor y , c hoose the RAID M anagement item and the RAID Management screen appear s. This screen list s the RAID volumes currently residing in the Thecus IP storage. F rom this s cree[...]

  • Страница 36

    36 Chapter 3: Sy stem Administration Di sk N o. Number assig ned to the installed har d disks. Capacity (MB) Capacity of the instal led hard disks. Model M odel nu mber of the install ed hard disks. Status Status of the installed hard disks. Used If this is check ed, current hard disk is aalready par t of a RAID volume . Spare If this is check ed, [...]

  • Страница 37

    37 Chapter 3: Sy stem Administration In a multiple R AID conguration, one RA ID volume must be designated as th e Maste r RAID volume. The M aster R AID volum e will s tore all installed modules. I f the Master RAID is changed to another loc ation (i.e. assigning volume 2 to be the Master R AID volume after volume 1 had been previously assigned)[...]

  • Страница 38

    38 Chapter 3: Sy stem Administration Please keep your USB disk in a safe place and also backup the encr ypte d k e y. Th ere is no wa y to rescu e data back if th e key is lost. With R AID volume encr yption enabled, the system per formance will go down. RAID volumes with encr ypt ion enabled w ill be displayed with a k ey lock symbol ne xt to volu[...]

  • Страница 39

    39 Chapter 3: Sy stem Administration P ress “ Ye s ” for R AID volume creat ion preparation. Then click “ Finish ” to star t up with RAID 1 0. volume building. Building a RAID volume may be time consuming, depending on the size of hard drives and R AID mode. In general, if the R AID volume building process is up to “RAID Building ” , th[...]

  • Страница 40

    40 Chapter 3: Sy stem Administration Level Model JBOD RAID 0 RA ID 1 RAID 5 RAID 6 RA ID 10 N2520/ N2560    N4520/N4560       RAID configura tion is usually required only when you first se t up the de vice. A br ief des cription of each RAID setting fol lows: RA ID Le vels Level Description JBOD The st orage vol ume is [...]

  • Страница 41

    41 Chapter 3: Sy stem Administration[...]

  • Страница 42

    42 Chapter 3: Sy stem Administration Remove R AID • Click to remove the R AID volume . All user data and iSCSI crea ted in the selec ted RAID volume wil l be deleted. To remove a RAID volume, follow the steps b elow : On the RAID List screen, select the RAID volume by clic k ing on its radio button, and cli ck RAID 1 . Infor mation to open the RA[...]

  • Страница 43

    43 Chapter 3: Sy stem Administration Migrating a RA ID (Dose not apply to the N2520/N2560 ) • Once a RAID volume has been created, you may want to move it to other physical dri ves or change the R AID array a ll tog ether . T o m igrat e a RAID 1, RAI D 5 or RAI D 6 volume, follow the steps below : F rom the R AID Configuration screen, click M i[...]

  • Страница 44

    44 Chapter 3: Sy stem Administration Migrating a R AID volume could tak e several hours to complete. • The RAID migration feature is available only when it is congurable. • Here is a list of limitation with RAID leve l migration function : During RAI D le vel m igration, it is not permitted to reboo t or shutdown system. 1 . Fo r RAID migrat[...]

  • Страница 45

    45 Chapter 3: Sy stem Administration NAS Stacking (N4520/N 4560 Only) 3.4 .3 The Thecus IP storage ’ s cap acity can b e expande d even fur ther using the stack able func tion. With i t, users c an expand the capacit y of their net work storage s ystems up to 5 other s tack t arget volumes which are loc ated in different s ystems. These can b e [...]

  • Страница 46

    46 Chapter 3: Sy stem Administration Nex t, input the target IP address of the s tack able de vice and click the Discover y button. The system will list available target volume s fro m the input ted IP addr ess. Once the volume IP has b een set , you may nee d to input a valid user name and p assword to validate your access r ight s . I f there is [...]

  • Страница 47

    47 Chapter 3: Sy stem Administration F rom the figure above, the Stack ed T arget name i s “ pmmeeting” . The figures below show the result before and after via M icr osof t N et work A ccess w hen set ting s have been completed . The Browseable setting is the same me thod us ed for setting a sys tem share folder . I t desig nates whether or [...]

  • Страница 48

    48 Chapter 3: Sy stem Administration The Public setting will be set the same way as the set ting for the system share folder associated with the ACL per mission is . If Pu blic is set to Y es, all users will be able to access it, and ACL button will be gray ed out. I f Publ ic is set to No , the A CL button will be available in the Stack T arge t L[...]

  • Страница 49

    49 Chapter 3: Sy stem Administration With this new ly att ached stack t arget dev ice, you will see the infor mation displayed and also have access to s everal op tions to choose from . In general, if the at tached stack target device has been used by an other Thecus NAS as stack target volume , then the F ormat item will be display and system w il[...]

  • Страница 50

    50 Chapter 3: Sy stem Administration D . Stack T arget ACL If the stack target Public setting set to Ye s , then the ACL button will be grayed out. However , if P ublic setting is se t to No , then the ACL button wil l be av ailable for you to setup user acce ss per mission s for the stack tar get. The ACL setting s wi ll be ex actly the sa me as t[...]

  • Страница 51

    51 Chapter 3: Sy stem Administration ISO Image Mounting (N4520/N4560 Only) 3.4 .4 The ISO I mage M ounting feature is a ver y usef ul to ol f rom the Thecus product s. With it , users can mount an ISO file and hav e the expor t name display all the de tails f rom the mo unt ed I SO fil e. F rom the Control Panel , the IS O Image Mounting feature [...]

  • Страница 52

    52 Chapter 3: Sy stem Administration T o mount the ne w ISO file, selec t one file from the lis t of file s and inp ut the desired mounting name into the “ Mount as: ” field. Click “ ADD ” t o confir m the completion o f the mounting. I f nothin g i s inp ut in the “ Moun t as ” ISO file expor t name field , the system will autom[...]

  • Страница 53

    53 Chapter 3: Sy stem Administration iSCSI (N4520/N4560 Only) 3.4 .5 Y ou may spec ify the spa ce allocated for iSCSI. Se e the table below to the allowed iSCSI target num- See t he table below to the allowed iSCSI target num- S ee the table below to the allowed iSCSI target num- iSCSI t arget num- num - ber per system : Model N4520/N4560 Allow ed [...]

  • Страница 54

    54 Chapter 3: Sy stem Administration The Create iSCSI V olume scree n appears. Create i SCSI V olume Item Description iSCSI T arget Volume Enable or Disable the iSCSI T arget Volume . T arget Name Name o f the iSCSI T arget. This name will b e used by the S tack able NAS func tion to identif y this ex - por t share. iqn_ Ye a r Selec t the cur rent[...]

  • Страница 55

    55 Chapter 3: Sy stem Administration The iSCSI target volume creation will associate at least one L UN together . It can be assigned either “ Thin-Pro visioning” or “Inst ant Allocation ” . Enable the iSCSI T arget Vol ume by selec ting Enable. 2. Enter a T arget Name. This will be use d by the St ack able NAS func tion to identif y this ex[...]

  • Страница 56

    56 Chapter 3: Sy stem Administration Expand V olu me • The iSCSI vol ume is now able to expand it s capacity from unused space (Instant Allocation mode only). F rom the volume list , simply selec t the iSCSI volume you like to expand and click the Expand button: Y ou wil l then see the d ialog box displayed b elow . Drag the Expand Capa cit y bar[...]

  • Страница 57

    57 Chapter 3: Sy stem Administration Delete V olu me • To delete volume on the cur rent RAID volume, follow the steps below : Under the Volume Allocation List, click D elete . 1 . The Sp ace Alloc ation screen appears . P ress YES. All data in the volu me wil l be removed . 2. iSCSI Thin-Pr ovisioning • If i SCSI Thin-Provisioning is selec ted [...]

  • Страница 58

    58 Chapter 3: Sy stem Administration volume is available from the list. Please ref e r to the screensho t below. If creating an iSC SI t arget volume under “Instant A llocation ” , physic al memor y i s as sign to the target , being limited by the available memor y . F or the iSCSI target volume creat ed under “ thin-provision i n g ”, vir [...]

  • Страница 59

    59 Chapter 3: Sy stem Administration Nex t, input “ Initiator iqn ” and setup iSCSI target volume ac cess privilege s fro m the av ailable list . A pply by click ing the OK button. The ac cessible I nitiator will be listed as shown in the screen shot displaye d below . The listed “ Initiator iqn ” c an be modified or deleted by select ing [...]

  • Страница 60

    60 Chapter 3: Sy stem Administration iSCSI CRC /Checksum T o enable this option, the initiator c an connec t wi th “ Data digest ” and “ Header digest ” . Max Con nec tions The maximu m number of iSC SI connec tions . Error Recover y Level The Error R ecover y Level (ERL) is negot iated during a leading iSCSI connec tion login in t radition[...]

  • Страница 61

    61 Chapter 3: Sy stem Administration F ile Sharin g/Privilege 3.5 The Thecus IP storage has built-in user dat abase that allows administr ators to manage user ac cess using different gr oup policies. F rom the F ile Sharing/Privilege menu, you can crea te, modify, and de - F ile Shar ing/Privilege menu, you can create, modify, and de - menu, you c[...]

  • Страница 62

    62 Chapter 3: Sy stem Administration AD Domain Ex ample Item I nformation Work Group / D omain Name domain ADS Suppor t Enable ADS S er ver Name Computer1 ADS Realm D omain.local Administra tor ID Administrator Administra tor Password *********** The DNS server spe cified in the W AN/LAN1 configuration page • should be able to correc tly resolve [...]

  • Страница 63

    63 Chapter 3: Sy stem Administration All users are automatically assigned to the ‘ users’ gr oup. • Edit Users • Selec t an existing user f rom the Local User Configurat ion screen. 1 . Click on the Edit button, and the L ocal User Setting screen appea rs. 2. F rom here, you can enter a ne w pass word and re - enter to confirm, or use the[...]

  • Страница 64

    64 Chapter 3: Sy stem Administration Local Group C onguration 3. 5.3 F rom the File Sharing/Privilege c ategor y, choose the Group item, and the Local Group Configura tion screen appe ars. This sc reen allows you to Add, Edit, and R emove loc al groups. Local Group Conguratio n Item Description Add P ress the Add button to add a user to the [...]

  • Страница 65

    65 Chapter 3: Sy stem Administration Edit Group s • On the Local Group Configurati on screen, select a group name from the list. 1 . P ress the E dit but ton to modi fy the members in a gr oup. 2. T o add a user into a group, selec t the user from the Users Lis t, and press the << button to 3. move the user into the Members List. T o remov[...]

  • Страница 66

    66 Chapter 3: Sy stem Administration Shared F older 3.5 .5 F rom the Fi le Sharing /P r ivilege categor y , cho ose Shared Folder , and the Shared Folder screen ap - F ile Sharing/ P r ivilege categor y , choo se Shared Folder , and the Shared F older screen ap - ca tegor y , choos e Shared Folder , and the Shared F older screen ap - Shared Folder [...]

  • Страница 67

    67 Chapter 3: Sy stem Administration you to change folder information. Af ter en tering the information, press Apply to save your changes. Modify Folder Item Description F older Name Enter the name of the folder . Public Admit or deny public access to this folder . Apply Pr ess Apply to create the folder . Remove F older s • To remove a folder , [...]

  • Страница 68

    68 Chapter 3: Sy stem Administration NFS Share • T o allow NFS acc ess to t he share folder , enable the NFS S er vice, and t hen se t up hosts wi th access rights b y click ing Add. NFS Sh are Item Description Hostname Enter the name or IP address of the host Privil ege Hos t has eit her read only or wr iteable access to the folder . OS Suppor t[...]

  • Страница 69

    69 Chapter 3: Sy stem Administration Samb a Congurati on • On the F older screen, press the Samba but ton and the S amba Configuration s creen appear s. This screen allows you to setup samba c onfiguration for assoc iated folder . Af ter entering the informa tion, press Apply to ac tivate input settings. Samba Conguration Item Description[...]

  • Страница 70

    70 Chapter 3: Sy stem Administration A CL setting Item Description Deny Denies ac cess to us ers or grou ps who are displayed in this c olumn. Read Only P rovides R ead Only access to users or groups who are displayed in this c olumn. Writable Provides Write access to users or groups who are displayed in this column. Recursive Enable to inherit the[...]

  • Страница 71

    71 Chapter 3: Sy stem Administration The ACL can only be se t for share and sub- folders level, not for les. The ACL screen also allows you to s earch for a par ticular user . T o do this, follow the steps below : In the b lan k , enter the name of the user you would lik e to find. 1 . F rom the drop down select the grou p you would like to sea[...]

  • Страница 72

    72 Chapter 3: Sy stem Administration User and Group Back up 3. 5.7 The user and group b ackup feature allow sy stem user s and groups to be back ed up to an other location and be res tore d if needed. Ple ase no te, when resto rin g previous b ackup users and groups, the cur rent users and groups lis t will be replaced from t his r esto re fi le ?[...]

  • Страница 73

    73 Chapter 3: Sy stem Administration LDAP Suppor t (N4520/ N4560 Only ) 3. 5.8 The LDAP is another way to authenticate login users w ho have joined the LDAP ser ver . Y ou will need to fill in the LDAP ser ver informa tion to get LDAP authentic ation st ar ted. Please mak e sure that the LDAP ser ver has a Samba sa m and a POSIX Ob jectClass accou[...]

  • Страница 74

    74 Chapter 3: Sy stem Administration Network S er vice 3. 6 Use t he Net work Ser vic e c ategor y to mak e net work ser vic e suppor t sett ings. Samba / CIFS 3.6 .1 There are op tions allow Admin to Enable/Disable to operate Thecus IP storage ass ociated with Samba / CIFS protocol . With the option changed , it will need to reboot system to activ[...]

  • Страница 75

    75 Chapter 3: Sy stem Administration The Thecus IP stora ge is supp or ted rec ycle bin via SMB /CIFS protoc ol. Simply enable the “Rec ycle Bin ” f unction and “Rec ycle F older Display ” then all of deleted files/ folders will reside in the “_N AS_Re cycle _(Associate d RDID V olume)” share folder . F or e xample, the sy stem has cre[...]

  • Страница 76

    76 Chapter 3: Sy stem Administration AFP (Apple Network Se tup) 3.6 .2 F rom the Networ k S er vice categor y, choose the A FP item, and the A FP Suppor t sc reen appe ars. This screen displays the c onfiguration items for the Apple Fi ling Protocol. Y ou can change any of these items and press Apply to confirm your set tings. A de scription of e[...]

  • Страница 77

    77 Chapter 3: Sy stem Administration FTP 3.6 .4 The Thecus IP storage can ac t as an FTP ser ver , enabling us ers to download and upload files wi th their f avorite FT P programs. F rom the Net work S er vice ca tegor y, choo se the FT P i tem, and the FTP screen appe ars. Y ou can change any of these items and press Apply to c onfirm your sett [...]

  • Страница 78

    78 Chapter 3: Sy stem Administration A de scription of each item follows: T FTP Item Description TFTP Enables T FT P Ser vice on t he Thecus IP storage . NICs Checked W AN/L AN1 or LAN2 to enable por t use Por t Specifies the por t number of an incoming connec tion on a non-standard por t. Share Folder Selec t the file stored folder, it cann ot b[...]

  • Страница 79

    79 Chapter 3: Sy stem Administration Disable HT TP suppor t and Enable Secure HT TP support to guarantee secure access . UPnP S er vice 3 .6.7 This device suppor ts UPnP Media ser ver, which allows us ers to play media files with UP nP client ( ex. DMA devic es). Enable or disable Universal Plug and Play protocol. UPn P helps to find the IP addre[...]

  • Страница 80

    80 Chapter 3: Sy stem Administration DDNS 3. 6.1 0 T o se t up a ser ver on the I nternet and enable the users to c onnect to it easily, a fixed and e asy-to remember hos t name is of ten requir ed. However, if the ISP provides only dynamic IP address, the IP address of the ser ver will change from time to t ime and is difficult to recall. Y ou ca[...]

  • Страница 81

    81 Chapter 3: Sy stem Administration UPnP P or t Management 3 .6.1 1 One o f the mos t conven t way to allow user s to acc ess required ser vices such as FTP , SSH, web disk and http etc. f rom Inter net environment is set ting UPn P por t management . T o se t up this UPnP por t forw arding feature, please be sure that the router has “ UPn P Ser[...]

  • Страница 82

    82 Chapter 3: Sy stem Administration We b D AV 3 .6. 12 The W ebDA V is an ex tended protoc ol of http( s) which allows remote access to your NAS s ystem. T o be gin using W ebDA V and WebD A V SSL , simply click enable and provide the por t number . The default por t num ber is 9800 , unde r normal ci rcumstances this wil l not need to be chan ged[...]

  • Страница 83

    83 Chapter 3: Sy stem Administration ThecusID 3.6 .1 4 Creating a Thecus ID w ill give you full access to all that Thecus has to offer . Af ter creating a Thecus ID , you‘ll receive a f ree* DDNS (i.e“ yourname.thecuslink .com ” .) Y ou can use your DDNS to easily ac cess your NAS, make use of the mobile T - On TheGo™ app, and share links [...]

  • Страница 84

    84 Chapter 3: Sy stem Administration If you don ’t have a Thecus ID, click “Register ” and the screen below will appe ar . Please fill in the required information and click Apply . Register Thecus ID Item Description Thecus ID Input a valid email address. It will require conrmation to activate your Thecus ID . Password Input the password f[...]

  • Страница 85

    85 Chapter 3: Sy stem Administration Application Ser ver 3. 7 The Thecus IP storage supp or ts built-in application such as iTunes ser ver as well as a dd-on official or third -p ar t y app lications. iT unes® S er ver (Built in) 3. 7.1 With the built-in iT unes ser ver capabilit y , Thecus IP stor age enables digital music to be shared and played[...]

  • Страница 86

    86 Chapter 3: Sy stem Administration Add-on O cial Applications 3. 7.2 There are sever al default pre -loade d official applications such as WebDisk, Piczz a (Photo ser ver ) and T ra nsm iss ion- Kit (BT d own load ma nag er) th at ca n be fou nd fr om t he Ap pli cati on Se r ve r cate gory . 3rd par ty App Installation 3. 7.3 F rom the Applic[...]

  • Страница 87

    87 Chapter 3: Sy stem Administration Backu p 3. 8 The re ar e a num ber of ways to ba ck up data w ith the Thecus IP s torage . Rsync T arget Ser ver 3 .8.1 When it come s to back ing up your da ta, it ’ s ver y impor tant to have flexibility. Data guard provides you with many options, including full back up for all shares, custom back up for se[...]

  • Страница 88

    88 Chapter 3: Sy stem Administration Remote Data backup Item Description Add Add new task . Edit Edit selec t t ask. Remove Remove selec t task Star t If associated task has been setup in schedule and like to star t at once, click on to star t task right aw a y. Stop Stop the asso ciated running task. The other scenar io is if a task has been setup[...]

  • Страница 89

    89 Chapter 3: Sy stem Administration Remote Data backup Item Des cription F ull Backup The “ F ull back up ” will have all shares from source backup to destination. I t could also create shares automatically f rom destination if it is not existent. This only appl ies if the target ser ver is the s ame model as the sour ce. Custom Backup The “[...]

  • Страница 90

    90 Chapter 3: Sy stem Administration F ull B ackup • Click on full back up and the se tup screen appear as below. F ill in the remote target IP (De stination) and port (need to be change d only if this por t is already in use). If encr yp tion is required then enable it. Please mak e sure the associated target ser ver also has encr ypt ion enable[...]

  • Страница 91

    91 Chapter 3: Sy stem Administration -F ill out all the necessar y details and choose your parameters Add Rsync B ackup T ask Item Description T ask Name This is how this task will appear in the task list . Backup T ype Real time: I t w ill backup folder s/files from source to target on the fl y . On the other hand, any changes f rom the s ource [...]

  • Страница 92

    92 Chapter 3: Sy stem Administration F rom the task lis t, you can now s ee the ne wly added task “ fullb ack01 ” . The back up is setup as “ real time ” . F rom the status field, “ P rocessing ” can be read as the back-up is per formed on the fly . Custom Backup • The custom b ackup se tting is similar to the full back up. The only[...]

  • Страница 93

    93 Chapter 3: Sy stem Administration Click “ Nex t ” and more setting app ear s . Th ese ar e the as t he set tings for “ F ull backup ” 3. Click “ F inish ” and the data guard task will ap pear in the list as show n below. 4. F rom the task list , you can now se e the newly added “ customback01 ” . This back up is setup as “ sche[...]

  • Страница 94

    94 Chapter 3: Sy stem Administration iSCSI Backup • If the source unit contain s iSCSI volume, it can be back ed up t o the t arget uni t as a single file. The proc edure is the same as for t he pre vious “ F ull b ackup ” and “ Custom back up ” , selec t “ iSCSI backup ” from data guar d wizard. Inputs the share folder name of the t[...]

  • Страница 95

    95 Chapter 3: Sy stem Administration 4. Click “ F inish ” and the data guard task will appea r in the list as sho wn below. F rom the task list , you can now see the newly added “ iscsiback ” . This backup is setup as “ schedule ” . The source folder name will use iSCSI_+target volume name. So here it is displayed as “ iSCSI_pmtest ?[...]

  • Страница 96

    96 Chapter 3: Sy stem Administration This is a useful feature if the sy stem configuration ne eds to be re store d to a brand new unit . L e t ’s g o thru the following ex ample to see how it works . The original source system has 3 RAID volume , “ R AID ” , ‘ R AI D10 ” and “ RAID 20 ”, and has back ed up the system configuration s[...]

  • Страница 97

    97 Chapter 3: Sy stem Administration Click “ Nex t ” and a screen wil l app ear as show n below . I t has the listed available sy stem 3. configuration backup file s . Select the one you want and click nex t. Y ou also have the option to downloa d the current s ystem c onfiguration before restor ing fr om the backup file. Af ter click ing ?[...]

  • Страница 98

    98 Chapter 3: Sy stem Administration T he backup configuration has different numbers of RAID volume than the curren t sy ste m (3 5. vs 1). I t can be k ept as the RAID volume mapping arranged by t he system , then car r y on to click “ F inish ” . This me ans that all 3 RA ID volumes configuration such as share folder etc. will all rest ore[...]

  • Страница 99

    99 Chapter 3: Sy stem Administration Data Guar d (Local Backup) 3.8 .3 The Thecus product provides c omplete backup solution bet ween Thecus NAS s ystems as well as bet ween folders of local s ystem s . Remote Data backup Item Description Add Add a new task. Edit Edit selec t ed task . Remove Remove selec t ed task . Star t C lick on star t to star[...]

  • Страница 100

    100 Chapter 3: Sy stem Administration Local Data backup Item Description Impor t This is associated with ex ternal device s which are added to the system such as USB disk. Yo u can sele ct a folder f rom an ex ternal de vice and impor t it to t he NAS as a share folder . Copy Copy folder to folder or NAS folder to ex ternal device or exter nal de v[...]

  • Страница 101

    101 Chapter 3: Sy stem Administration impor t ed them to the NAS under the RAID60volume. Nex t, please selec t the path from the drop down list to save the log. Also , give the access permission whether these selecte d folders will be “ Public ” or no t af ter the impor t. Read the no tes and check the “ Accept ” box for confi r mation. I [...]

  • Страница 102

    102 Chapter 3: Sy stem Administration N o w, you will see in the data guard task list that you have cr eated a t ask . And th at the sy stem ha s created 2 ne w share folders from the task jus t crea ted. Copy : click on “ Copy ” and this screen appea r s. 2. 3 di fferent op tions c an be s elected, folder to folder , folder to ex ternal dev i[...]

  • Страница 103

    103 Chapter 3: Sy stem Administration F older to F older • F ol der t o exter nal devic e • External device to Folder •[...]

  • Страница 104

    104 Chapter 3: Sy stem Administration Let ’ s tak e “ Folder to E xter nal de vice ” as an e xample. I n the s ource pan e , s elect the d esired R AID volume and its associated folder list will appe ar ; same method i n the t arget pa ne for the associated ex ternal de vice. Selec t a folder f rom the so urce pan e which is going to be c opy[...]

  • Страница 105

    105 Chapter 3: Sy stem Administration Read the note s and check the “ Accept ” box for con firmation. N o w, you will see in the data guard task list that you have cr eated a t ask . Realtime Back up: click on “ Realti me Backup ” and this scree n wil l ap pear . 3. 2 di fferent options can be selec ted fr om , folder to folder , folder t[...]

  • Страница 106

    106 Chapter 3: Sy stem Administration Nex t, fill in the task name and related settings.[...]

  • Страница 107

    107 Chapter 3: Sy stem Administration Realtime Backup Item Description T ask Name Input the task name, length limited to 4~ 12 charac ters . Sync T ype Selec t “ I ncremental ” or “ Synchronize ” . Back up Symb olic Link Choose to back up symbolic link which is included in the source. Fil t e r The filter can be set to be execut e d only i[...]

  • Страница 108

    108 Chapter 3: Sy stem Administration Schedule Back up: click on “ Schedule B ackup ” an d this screen w ill. 2 differen t choices can be 4. selec ted fro m , folder to folder , folder to ex ternal dev ice. Let ’ s use “ F older to Ex ternal device ” backup for our example. F rom the NAS volume RAID in the S ource pane select the folder [...]

  • Страница 109

    109 Chapter 3: Sy stem Administration Read the note s and check the “ Accept ” box for con firmation. N o w, you will see in the data guard task list that you have cr eated a t ask . iSCSI Back up: click on “ iSCSI Ba ck up ” and scr een appear as below . 5. It can be backup to t wo diffe rent storage pool, iSCSI to fold er , iSCSI to ex [...]

  • Страница 110

    110 Chapter 3: Sy stem Administration Let ’ s take exam ple to have “ iSCSI to F older ” backup, from existed iSCSI volume “ iSCSI_iscsiv502 ” to volume RAID folder “ andy_local ” . The source pane lis ted “ iSCSI_iscs iv502 ” and “ iSCSI_is csiv50 ” where are iscsi volume has e xisted in this system with name “ iSCSI_+iscsi[...]

  • Страница 111

    111 Chapter 3: Sy stem Administration task list will have created task listed. T o st ar t the iSCSI volume back up , selec t the task and click “ St ar t ” from task bar . Once “ Start ” click , the associated iSCSI volume will not allow to I/O during backup processing . And the t ask s tatus w ill change to ‘ P rocessin g ” . States c[...]

  • Страница 112

    112 Chapter 3: Sy stem Administration iSCSI Import: click on “ iSCS I I mport ” and screen appear as below . 6. It can be impor ted from t wo different storage pools , folder to iSC SI or ex ternal dev ice to iSCSI. I t is depend on where iSCSI volume has b ackup to . Let ’ s t ake e xample to impor t “ RAID folder to iSCSI ” which is th[...]

  • Страница 113

    113 Chapter 3: Sy stem Administration Nex t, provide where the task log will store. Reading the note and check on “ Accept ” for confirma tion. Now , from the data guard task list will ha ve created task listed . A CL Backup and R estore 3.8 .4 The ACL b ackup and restore feature enables the system ACL (Access Control List) to be back ed up on[...]

  • Страница 114

    114 Chapter 3: Sy stem Administration F or the ACL res tore , it can be restored in the same system or used in an other unit. F or e xample, l e t ’s rest ore th e ACL backu p file to an other unit. This unit has a RAID volume “ RAIDpm ” with share folder s as listed on right ha nd screen shot. Af ter input ting the ACL back up f ile and cli[...]

  • Страница 115

    115 Chapter 3: Sy stem Administration Data Bu rn 3.8 .5 The data burn is featured to suppor t 3 different modes o f data burning for files/folders to and from image file and physical optical disk . The 3 different modes are “ Write F iles/folder s to disc ” , “ Wr ite ima ge to disk ” and “ Write files/ folders to image ” . Write F[...]

  • Страница 116

    116 Chapter 3: Sy stem Administration Selec t f rom the installed USB bur ning devic es. Ple ase click t h e “ detec t disc ” button to c. check the s tatus onc e the disc is inser ted. Selec t the burnin g speed from the drop down li st. d. Selec t whe ther disc data verifica tion is required or not. e. Click “ Burn ” to star t disc burni[...]

  • Страница 117

    117 Chapter 3: Sy stem Administration Selec t the ISO file. b . Selec t f rom the installed USB bur ning devic es. Ple ase click t h e “ detec t disc ” button to c. check the s tatus onc e the disc is inser ted. Selec t the burning speed from the drop down l ist. d . Selec t whe ther disc data verifica tion is required or not. e. Click “ Bu[...]

  • Страница 118

    118 Chapter 3: Sy stem Administration Input the path where the ISO file is going to be store d , you can press the “ Brow se ” c. button to have the share list appear . Inpu t the ISO file name for burned image file. d . Click “ Burn ” to start the ISO file burning. e. The data burn does not suppor t rewr iteable media i f it has been b[...]

  • Страница 119

    119 Chapter 3: Sy stem Administration W indo ws XP SP2 • T o set up the P r inter S er ver in Windows XP SP2, follow the steps below : Connect the USB printer to one of the USB por ts (preferably the rear USB por ts ; f ront USB 1 . por ts can be used for ex ternal HDD enclosures). Go to Star t > P rinters and F ax es. 2. Click on F ile > A[...]

  • Страница 120

    120 Chapter 3: Sy stem Administration Selec t Add a net work , wireless or Bluetooth pr inter . 3. Selec t The printer that I want isn ’t listed. 4. Y ou can press The printer that I w ant isn ’t lis ted to go into ne xt p age without waiting for Searching for av ailable printers to finish. Click Selec t a shared printer by name. 5.[...]

  • Страница 121

    121 Chapter 3: Sy stem Administration T yp e ht tp:// <Thecus_NAS>: 631/printers/usb -printer in the box , where <Thecus_NA S_IP> is the IP address of Thec us IP stor age . Click Nex t. Selec t or install a printer and then press OK . 6. Windows w ill attempt to connec t to the printer . 7. Y o u can ch oose to set th is prin ter as th [...]

  • Страница 122

    122 Chapter 3: Sy stem Administration Done! Click F inish. 9.[...]

  • Страница 123

    123 Chapter 3: Sy stem Administration Uninterrupted P ower S ource 3.9 .2 F rom the Extern al Devices menu, choose the U ninterrup ted Power Source item and the UPS S etting screen appe ars. Mak e any changes you wish, and press Apply to confirm changes. See the following table for a detailed des cription of each item. UPS Setting Item Description[...]

  • Страница 124

    124 Appendix A: Customer Suppor t Appendix A: C ustomer Suppor t  If you are still e xperiencing problems wi th your Thecus IP storage , o r require a R eturn M erchandise Authoriza tion (RMA), feel f ree to contac t te chnical suppor t via our T echnical Suppor t W ebsite: http: //w ww.thecus.com/sp _tech.ph p Customers in the US should send al[...]

  • Страница 125

    125 Appendix B: RAID Bas ics Appendix B: RAID Basics  O ver v iew • A Redundant Ar ray of I ndependent Disks (R AID) is an ar ray of sever al hard disks tha t provide dat a securi ty and high per formance. A R AID s ystem acc esses se veral hard disks simultane ously , which improves I /O per for mance over a single hard disk . Data secur ity [...]

  • Страница 126

    126 Append ix B: RAID Basi cs RAID 5 RAID 5 offers data se curity and i t is best suited for net works that per form many small I /O tr ansactions at the same time, as well as applications that require data securi ty such as office automation and on - line custo mer ser vice. Use it also for application s with hig h read requ ests but low write re[...]

  • Страница 127

    127 Appendix B: RAID Bas ics listed bel ow : RA ID Leve l Per centage Used RAID 0 100% RAID 1 1/n x 100 % RAID 5 (n- 1)/ n x 10 0% RAID 6 (n-2)/n x 10 0% RA ID 10 50% JBOD 100 % n: HD D number[...]

  • Страница 128

    128 Appendix C: Active Director y Basics Appendix C: A c tive Dir ec tor y Basics  O ver v iew • With Wind ows 2000, Microsof t introdu ced Active Director y (ADS), which is a large database/ information store. Prior to Ac tive Direc tor y t he Windows O S c ould not s tore a dditional infor mation in its domain database. Active Director y als[...]

  • Страница 129

    129 Appendix D: Licensing Informat ion Appendix D: Lic ensing I nf ormation  O ver v iew • This product included c opyrighted third-par t y so ft ware licensed under the ter ms of GNU Gener al Pu blic Lic ense. Please see THE GNU Gener al Public License for ex tra ter ms and c onditions o f this license. Source Co de Av ailabilit y Thecus T ec[...]

  • Страница 130

    130 Appendix D: Licensing Informat ion C GIC L icense T erms • Basic License CG IC, copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004 by Thomas Boutell and Boutell . Com, I nc. P er mission is granted to use CGIC in any application, commercial or noncommercial, at no co st. HOWE VER, this copyr ight paragraph must appear on a “ cre[...]

  • Страница 131

    131 Appendix D: Licensing Informat ion the recipients all the r ights that you have. Y ou must make sure that they, too, receive or can get the so urc e code . An d yo u mu st s how t hem t hes e term s so t hey know thei r rig hts . We protect your rights with two steps: (1) copyr ight the sof t ware, and (2) offer you this license which gives yo[...]

  • Страница 132

    132 Appendix D: Licensing I nformation warr ant y pro tect ion in exchange for a fe e. 2. Y ou may modify your copy or copies of the P rogram or any por tion of it , thus forming a work based on the Program, and copy and distribute such modifications or wor k under the ter ms o f Sec - tion 1 above, provide d that you also meet all of these condit[...]

  • Страница 133

    133 Appendix D: Licensing Informat ion ware interchange; or , b) Accompa ny it with a written o ffer , valid for at least three years, to give any third part y , for a charge no more than your cos t of physically per forming source distr ibution, a complete machine - readable copy of the cor responding source code, to be dis tributed under t he te[...]

  • Страница 134

    134 Appendix D: Licensing Informat ion 7. If, as a cons equence of a cour t judgment or allegation of patent infr ingement or for any other reason (not limited to pa tent issues), c onditions are imposed on you (w hether by cour t order , agree - ment or other w ise) tha t contr adict the condi tions of this L icense, the y do not excuse you f rom [...]

  • Страница 135

    135 Appendix D: Licensing Informat ion riv atives o f our free sof t ware and o f promot ing the shar ing and reuse of sof tw are generally . NO W ARRANT Y 11. BEC A USE THE PRO GRAM IS LICENSED FREE OF CHAR GE, THERE IS NO W ARRANT Y FOR THE PROGRAM, TO THE EXTENT PERMIT TED BY APPLI CABLE LA W . EXCE PT WHEN O THER WISE ST A TED IN WRITING THE CO[...]