Thecus Technology i Series manual
- Consulta online o descarga el manual de instrucciones
- 91 páginas
- 2.52 mb
Ir a la página of
manuales de instrucciones parecidos
-
Network Card
Thecus Technology N8800
125 páginas 6.04 mb -
Network Card
Thecus Technology i Series
91 páginas 2.52 mb -
Network Card
Thecus Technology Thecus N199
94 páginas 1.77 mb -
Network Card
Thecus Technology 1U4500R
71 páginas 1.79 mb -
Network Card
Thecus Technology 1U4500R, 1U4500S
71 páginas 1.79 mb
Buen manual de instrucciones
Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones Thecus Technology i Series. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica Thecus Technology i Series o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.
¿Qué es un manual de instrucciones?
El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual Thecus Technology i Series se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.
Desafortunadamente pocos usuarios destinan su tiempo a leer manuales Thecus Technology i Series, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.
Entonces, ¿qué debe contener el manual de instrucciones perfecto?
Sobre todo, un manual de instrucciones Thecus Technology i Series debe contener:
- información acerca de las especificaciones técnicas del dispositivo Thecus Technology i Series
- nombre de fabricante y año de fabricación del dispositivo Thecus Technology i Series
- condiciones de uso, configuración y mantenimiento del dispositivo Thecus Technology i Series
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas
¿Por qué no leemos los manuales de instrucciones?
Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de Thecus Technology i Series no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de Thecus Technology i Series y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico Thecus Technology en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de Thecus Technology i Series, como se suele hacer teniendo una versión en papel.
¿Por qué vale la pena leer los manuales de instrucciones?
Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo Thecus Technology i Series, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.
Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual Thecus Technology i Series. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.
Índice de manuales de instrucciones
-
Página 1
Thecus i Series User’s Manual[...]
-
Página 2
Preface About this manual This manual is the introduction of i Series , and to help user to know the operation of the disk array system easily. Information contained in the manual has been reviewed for accuracy, but not for pr oduct warranty because of the various environments/OS/settings, Information and specification wi ll be changed without furt[...]
-
Página 3
Table of Contents Chapter 1 RAID introduction .......................................... 5 1.1 Features ........................................................................... 5 1.2 Terminology ..................................................................... 6 1.3 RAID levels ................................................................[...]
-
Página 4
3.7 Enclosure management ................................................. 50 3.7.1 SES configur ation ................................................................................. 51 3.7.2 Hardware m onitor ................................................................................. 51 3.7.3 Hard drive S.M.A.R.T. function support ........[...]
-
Página 5
Chapter 1 RAID introduction 1.1 Features i Series features: • Gigabit LAN (x2) -to- SATA II (xN bays) RAID controller. • RAID 6 ready. • SATA II support with SATA I backward compatible. • N-way mirror. • On-line volume expansion and RAID level migration. • Global/dedicated cache configuration by volume. • S.M.A.R.T. enabled. • Suppo[...]
-
Página 6
1.2 Terminology The document uses the following terms: RAID RAID is the abbreviation of “R edundant A rray of I ndependent D isks ” . There are different RAID levels with different degree of the data protection, data avai lability, performance to host environment. PD The P hysical D isk belongs to the member disk of one specific volume group. V[...]
-
Página 7
WT W rite- T hrough cache write policy. A caching technique in which the completion of a wr ite request is not signaled until data is safely stored on non-volatile media. Each data is synchronized in both data cache and the accessed physical disks. WB W rite- B ack cache write policy. A caching technique in which the completion of a write reques t [...]
-
Página 8
iSCSI I nternet S mall C omputer S ystems I nterface. CHAP C hallenge H andshake A uthentication P rotocol. An optional security mechanism to contro l access to an iSCSI storage system over the iSCSI data ports. iSNS I nternet S torage N ame S ervice. 1.3 RAID levels RAID 0 Disk striping. RAID 0 needs at least one hard drive. RAID 1 Disk mirroring [...]
-
Página 9
Chapter 2 Getting started 2.1 Before starting Before starting, prepare the following items. 1. Check the “Certification list” in Appendix A to confirm the hardware setting is fully supported. 2. Read the latest release notes before upgrading. Release notes accompany with release firmware. 3. A server with a NIC or iSCSI HBA. 4. CAT 5e, or CAT 6[...]
-
Página 10
The iSCSI target is the storage device it self or an appliance which controls and serves volumes or virtual volumes. The target is the device which performs SCSI commands or bridges it to an attac hed storage device. iSCSI targets can be disks, tapes, RAID arrays, tape libraries, and etc. Host 2 (initiator) Host 1 (initiator) iSCSI HBA NIC IP SAN F[...]
-
Página 11
Open-iSCSI website: http://www.open-iscsi.org/ Open-iSCSI README: http://www.open-iscsi.org/docs/README Features: http://www.open-iscsi.org/cgi-bin/wiki.pl/Roadmap Support Kernels: http://www.open-iscsi.org/cgi-b in/wiki.pl/Supported_Kernels Google groups: http://groups.google.com/ group/open-iscsi/threads?gvc=2 http://groups.google.com/group/open-[...]
-
Página 12
2.3.2 Remote control – secure shell SSH (secure shell) is required for i Series to remote login. The SSH client software is available at the following web site: SSHWinClient WWW: http://www.ssh.com/ Putty WWW: http://www.chiark.greenend.org.uk/ Host name: 192.168.1.100 Login name: admin Default password: admin Tips Thecus i Series only support SS[...]
-
Página 13
The following table is function description. Alarm Mute Mute alarm when error occurs. Reset/Shutdown Reset or shutdown controller. Quick Install Quick three steps to create a volume. Please refer to section 3.3 for operation in web UI. View IP Setting Display current IP address, subnet mask, and gateway. Change IP Config Set IP address, subnet mask[...]
-
Página 14
Caution Before power off, it is better to ex ecute “Shutdown” to flush the data from cache to physical disks. 2.4.2 System buzzer The system buzzer features are describing in the following: 1. The system buzzer alarms 1 second when system boots up successfully. 2. The system buzzer alarms continuously when there is error level event happened. T[...]
-
Página 15
Chapter 3 Web GUI guideline 3.1 GUI hierarchy The below table is the hierarchy of i Series GUI. Quick Install Æ Step 1 / Step 2 / Step 3 / Confirm System Config System name Æ System name IP address Æ DHCP / Static / Address / Mask / Gateway / DNS / HTTP port / HTTPS port / SSH port Language Æ Language Login config Æ Auto logout / Login lock Pa[...]
-
Página 16
Maintenance Upgrade Æ Browse the firmware to upgrade / Export config Info Æ System information Reset to default Æ Sure to reset to factory default? Config import & export Æ Import/Export / Import file Shutdown Æ Reboot / Shutdown Logout Sure to logout? 3.2 Login i Series supports graphic user interface (GUI ) to operate the syste m. Be sur[...]
-
Página 17
1. RAID light: Green means RAID works we ll. Red represents RAID failure happening. 2. Temperature light: Green is normal. Red represents abnormal temperature. 3. Voltage light: Green is normal. Red represents abnormal voltage status. 4. UPS light: Green is normal. Red represents abnormal UPS status. 3.3 Quick install It is easy to use “Quick ins[...]
-
Página 18
Step 1: Select “Quick install” then choose the RAID level to set. Please refer to Figure 3.3.1. After choosing the RAID level, click “ ”, which links to another page, user can set up “LUN” here. Figure 3.3.1 Step 2: Please select a LUN number. Access control of host w ould show as a wildcard “*”, which means every host can access th[...]
-
Página 19
3.4 System configuration “System config” selection is for the setup of “System name” , “IP address” , “Language” , “Login config” , “Password” , “Date” , “Mail” , “SNMP” , “Messenger” , “System log server” and view “Event log” . Figure 3.4.1 3.4.1 System name Select “System name” to change system [...]
-
Página 20
3.4.2 IP address Select “IP address” to change IP address for remote admi nistration usage. There are 2 selections, DHCP (Get IP address from DHC P server) or static IP. The default setting is Static IP ( 192.168.1.100 ) enabled. User can change the HTTP, HTTPS, and SSH port number when the default port number is not allowed on host/server. Fig[...]
-
Página 21
3.4.4 Login config Select “Login config” is to set only one admin and set the auto logout timing. The only one admin can prevent multiple users access the same controller in the same time. 1. Auto logout: The options are (1) Disabl e; (2) 5 mins; (3) 30 mins; (4) 1 hour. The system will log out automatically when the user is no response for a p[...]
-
Página 22
3.4.6 Date Select “Date” to set up the current date, ti me, and time zone before using or synchronize time from NTP(Network Time Protocol) server. Figure 3.4.6.1 3.4.7 Mail Select “Mail” to enter at most 3 mail addr esses for receiving the event notification. Some mail servers would check “ Mail-from address” and need authentication for[...]
-
Página 23
Figure 3.4.7.1 3.4.8 SNMP Select “SNMP” to set up SNMP trap for alert vi a SNMP. It allows up to 3 SNMP trap addresses. Default community setting is “public”. User can choose the event log levels and the default value of SN MP is INFO event log enabled only. Figure 3.4.8.1 There are many SNMP tools. The fo llowing web sites are for referenc[...]
-
Página 24
3.4.9 Messenger Select “Messenger” to set up pop-up message alert via Windo ws messenger (not MSN). User must enable the service “Messenger” in Windows (Start Æ Control Panel Æ Administrative Tools Æ Services Æ Messenger), and then event logs can be received. It allows up to 3 messenger addresses. User can choose the event log levels an[...]
-
Página 25
3.4.11 Event log Select “Event log” to view the event messages. Press “Filter” button to choose the display. Press “Dow nload” button will save the whole event log as text file with file name “log-ModelName-Ser ialNumber-Date-Time.txt”. Press “Clear” button will clear event log. Press “Mute” button will stop alarm if system [...]
-
Página 26
3.5 iSCSI config “iSCSI config” selection is for the setup of “Entity Property” , “NIC” , “Node” , “Session” , and “CHAP account” . Figure 3.5.1 3.5.1 Entity property Select “Entity property” to view the view the entit y name of the controller, and setup “iSNS IP” for iSNS (Internet Storage Name Service). Add an iSNS[...]
-
Página 27
3.5.2 NIC Select “NIC” to change IP addresses of iSCSI data ports. Figure 3.5.2.2 (Figure 3.5.2.2: there are 2 iSCSI data ports. ) User can change IP address by clicking the button “ ” in the “DHCP” column. There are 2 selections, DHCP (G et IP address from DHCP server) or static IP. Figure 3.5.2.3 Default gateway can be changed by clic[...]
-
Página 28
CHAP: CHAP is the abbreviation of C hallenge H andshake A uthorization P rotocol. CHAP is a strong authentication method used with point-to-point for user login. It’s a type of authentication in which the authenticat ion server sends the client a key to be used for encrypting the usernam e and password. CHAP enables the username and password to t[...]
-
Página 29
Figure 3.5.4.1 (Figure 3.5.4.1: iSCSI Session.) Pressing the button “ “ will display connection(s). Figure 3.5.4.2 (Figure 3.5.4.2: iSCSI Connection.) 3.5.5 CHAP account Enter “CHAP account” function to create/delete a CHAP account for authentication. Figure 3.5.5.1 (Figure 3.5.5.1: Press “Create” to create a CHAP a ccoun t.) - 29 -[...]
-
Página 30
Figure 3.5.5.2 (Figure 3.5.5.2: Create a CHAP acc ou nt named “chap1”.) 3.6 Volume configuration “Volume config” selection is for the setup of volume configurations including “Physical disk” , “Volume group” , “User data volume” , “Cache volume”, and “Logical unit” functions. Figure 3.6.1 3.6.1 Volume relationship diagra[...]
-
Página 31
VG PD 2 PD 3 DS PD 1 UDV 1 UDV 2 UDV 3 LUN 1 LUN 2 LUN 3 RAM Global CV Dedicated CV + + + - 31 -[...]
-
Página 32
The above diagram describes the relation ship of RAID components. One VG (Volume Group) consists of a set of UDVs (User Data Volume) and owns one RAID level attribute. Each VG can be di vided into several UDVs. The UDVs from one VG share the same RAID level, but may have different volume capacity. Each UDV will be associated with one specific CV (C[...]
-
Página 33
• PD column description: Slot The position of hard drives. The number of slot begins from left to right at the front side. The button next to the number of slot is “More Information” indication. It shows the details of the hard drive. WWN W orld W ide N ame. Size (GB) Capacity of hard drive. VG Name Related volume group name. Status The statu[...]
-
Página 34
command, and the speed can achieve Serial ATA Gen-1 signaling speed (1.5Gbps). Unknown Æ The disk doesn’t support above command, so the speed is defined as unknown. • PD operations description: Free disks Make the selected hard drive to be free for use. Global spares Set the selected hard drive(s) to global spare of all VGs. Dedicated spares S[...]
-
Página 35
Enter “Volume group” to view the status of each volume group. • VG column description: Figure 3.6.3.1 (Figure 3.6.3.1: There is a RAID 0 with 2 ph ysical disks, named “V G-R0”, total size is 148GB, related to 2 UDV. Another is a RAID 5 with 3 physical disks, named “VG-R5 ”.) No. Number of volume group. T he button next to the No. is ?[...]
-
Página 36
Status 2 “R” Æ R ebuild. This volume group is doing rebuilding. Status 3 “M” Æ M igration. This volume group is doing migration. RAID The RAID level of the volume group. The button next to the RAID level is “Migrate” fun ction. Click “Migrate” can add disk(s) to do expansion or change the RAID level of the Volume group. • VG ope[...]
-
Página 37
No. Number of this user data volume. The button in below to the UDV No. is “More Information” indication. It shows the details of the User data volume. Name Name of this user data volume. The button in below to the UDV Name is “Rename” function. Size(GB) Total capacity of this user data volume. The button in below to the size is “Extend?[...]
-
Página 38
• UDV operations description: Attach Attach to a LUN. Create Create a user data volume function. Delete Delete a user data volume function. 3.6.5 Cache volume Enter “Cache volume” function to view the status of cache volume. The global cache volume is a default ca che volume, which is created after power on automatically, and cannot be delete[...]
-
Página 39
• CV operations description: Create Create a cache volume function. Delete Delete a cache volume function. If there is no free space for creating a new dedicated cache volume, cut down the global cache size first. After resized, then dedicated cache volume can be created. Tips The minimum size of global cache volume is 40MB . The minimum size of [...]
-
Página 40
Figure 3.6.6.1 Figure 3.6.6.2 (Figure 3.6.6.2: UDV-01 is attache d to LUN 0 with every host can access. UDV-0 2 is attached to LUN 1 with only initiator not e named “iqn.1991-05.com.microsoft:s130 0n” can access.) • LUN operations description: Attach Attach a logical unit number to a user data volume. Detach Detach a logical unit number from [...]
-
Página 41
Example 2 is to create two UDVs. One shares global cache volume, the other uses dedicated cache volume. Set a dedicated spare disk. • Example 1 Example 1 is to create two UDVs in one VG, each UDV uses global cache volume. Global cache volume is created after system boots up automatically. So, no action is needed to set CV. Then set a global spare[...]
-
Página 42
Figure 3.6.7.2 (Figure 3.6.7.2: Creating a RAID 0 with 2 physi cal disks, named “VG-R0”. The total size is 148GB. Because of no related UDV th ere, free size still remains 148GB.) Step 2: Create UDV (User Data Volume). To create a data user volume, please follow the procedures. Figure 3.6.7.3 1. Select “/ Volume config / User data volume” .[...]
-
Página 43
Figure 3.6.7.4 (Figure 3.6.7.4: Create UDVs named “UDV-1” an d “UDV -2”, related to “VG-R0”, the siz e of “UDV-1” is 50GB, the size of “UDV-2” is 98GB. The status of these UDVs are online, write back, high priority with cache volume 383MB. There is no LUN atta ched.) Step 3: Attach LUN to UDV. There are 2 methods to attach LUN t[...]
-
Página 44
Figure 3.6.7.6 (Figure 3.6.7.6: UDV1 is attache d to LUN 0 with any hosts can access. UDV2 is a ttached to LUN 1 with only initiator note nam ed “iqn.199 1-05.com.microsoft:s1300n” can acc ess. ) Tips The matching rules of access cont rol are from top to down by sequence. Please refer 3.6.6 for details. Step 4: Set global spare disk. To set glo[...]
-
Página 45
(Figure 3.6.7.7: Slot 5 is set as global spare disk.) Step 5: Done. They can be used as iSCSI disks. Delete UDVs, VG, please follow the steps. Step 6: Detach LUN from UDV. In “/ Volume config / Logical unit” , Figure 3.6.7.8 1. Select LUNs by clicking the c heckbox of the row, then click “ ”. There will pop up a confirm page. 2. Choose “O[...]
-
Página 46
1. Select “/ Volume config / Volume group” . 2. Select a VG by clicking the checkbox of the row, make sure that there is no UDV on this VG, or the UDV(s) on this VG must b e deleted first. 3. Click “ “. There will pop up a confirmation page. 4. Choose “OK” 5. Done. The VG has been deleted. Tips The action of deleting one VG will succeed[...]
-
Página 47
Figure 3.6.7.9 1. Select “/ Volume config / Cache volume” . 2. If there is no free spac e for creating a new dedicated cache volume, cut down the global cache size first by clicking the button “ ” in the size column. After resized, click “ ” to return to cache volume page. 3. Click “ “ to enter the setup page. 4. Fill in the size an[...]
-
Página 48
Figure 3.6.7.10 1. Select “/ Volume config / User data volume” . 2. Click “ ”. 3. Input a UDV name, choos e a VG Name, select Dedicated cache which is created at Step 1, and input the size for the UDV; decide the stripe height, block size, read/write mode and set priority, finally click “ “. 4. Done. A UDV using dedicat ed cache has bee[...]
-
Página 49
Step 4: Attach LUN to UDV. Please refer to Step 3 of Ex ample 1 to attach LUN. Step 5: Set dedicated spare disk. To set dedicated spare disks, please follow the procedures: 1. Select “/ Volume config / Physical disk” . 2. Select a VG from the list box, then select the free disk(s), click “ ” to set as dedicated s pare for the selected VG. 3[...]
-
Página 50
To free dedicated spare disks, please follow the procedures: 1. Select “/ Volume config / Physical disk” . 2. Select the dedicated spare disk by c licking the checkbox of the row, then click “ “ to free disk. Step 11: Delete dedicated cache volume. To delete the cache volume, please follow the procedures: 1. Select “/ Volume config / Cach[...]
-
Página 51
5. LED status: 10 seconds. Figure 3.7.1 3.7.1 SES configuration SES represents S CSI E nclosure S ervices, one of the enclosure management standards. Enter “SES config” function can enable or disable the management of SES. Figure 3.7.1.1 (Figure 3.7.1.1: Enable SES in LUN 0, and can be accessed from ev ery host.) The SES client software is avai[...]
-
Página 52
Figure 3.7.2.1 If “Auto shutdow n” has been checked, the system will shutdown automatically when voltage or temperature is out of the normal range. For better data protection, please check “ Auto Shutdown ”. For better protection and to avoid sing le short period of high temperature triggering Auto shutdown, i Series use multiple condition [...]
-
Página 53
Figure 3.7.3.1 3.7.4 UPS Enter “UPS” function will set UPS ( U ninterruptible P ower S upply). Figure 3.7.4.1 Currently, the system only support and comm unicate with smart-UPS function of APC (American Power Conversion Cor p .) UPS. Please check detail from http://www.apc.com/ . First, connect the system and APC UPS via RS-232 for communicatio[...]
-
Página 54
(%) function. Shutdown Delay (s) If power failure occurred, and the system can not return back to the setting value period, the system will shutdown. Setting delay to “0” will disable the function. Shutdown UPS Select ON, when power is g one, UPS will shutdown by itself after the system shutdown successfully. After power comes back, UPS will st[...]
-
Página 55
Figure 3.8.1 3.8.1 Upgrade Enter “Upgrade” function to upgrade firmware. Pl ease prepare new firmware file named “xxxx.bin” in local hard dr ive, then press “ ” to select the file. Click “ ”, it will pop up a mess age “Upgrade system now? If you want to downgrade to the previous FW later, please export your system config first”,[...]
-
Página 56
3.8.3 Reset to default Enter “Reset to default” function, it allows user to res et controller to the factory default setting. Figure 3.8.3.1 Reset to default sets password to default: admin , and set IP address to default as Static IP. Default IP address: 192.168.1.100 (Static IP) Default subnet mask: 255.255.255.0 Default gateway: 192.168.1.1 [...]
-
Página 57
3.8.5 Shutdown Enter “Shutdown” function; it will display “Reboot” and “Shutdown” buttons. Before power off, it’s better to press “S hutdown” to flush the data from cache to physical disks. The step is be tter for the data protection. Figure 3.8.5.1 3.9 Logout For security reason, “Logout” function will allow l ogout while no [...]
-
Página 58
Chapter 4 Advanced operation 4.1 Rebuild If one physical disk of the VG which is set as protected RAID level (e.g.: RAID 3 , RAID 5, or RAID 6) is FAILED or has been unplugged/remov ed, then, the VG status is changed to degraded mode, the system will search/detect spare disk to rebuild the degraded VG to a complete one. It will detect dedicated spa[...]
-
Página 59
When rebuilding, the stat us of PD/VG/UDV is “R” ; and “R% ” in UDV will display the ratio in percentage. After complete rebuilding, “R” and “DG” will disappear. VG will become complete one. Tips The list box doesn’t exist if ther e is no VG or only VG of RAID 0, JBOD. Because user cannot set dedicated spare disk for these RAID le[...]
-
Página 60
4.2 VG migration and expansion To migrate the RAID level, please follow the below procedures. If the VG migrates to the same RAID level of the original VG, it is expansion. 1. Select “/ Volume config / Volume group” . 2. Decide which VG to be migrated, click the button “ ” in the RAID column next the RAID level. 3. Change the RAID level by [...]
-
Página 61
Figure 4.2.3 (Figure 4.2.3: A RAID 0 migrates to RAID 5, compl ete percentage is 2%.) To do migration/expansion, the total size of VG must be larger or equal to the original VG. It does not allow expanding the same RAID level with the same hard disks of original VG. During setting migration, if user doesn’ t setup correctly, controller will pop u[...]
-
Página 62
4. Extension starts. If UDV needs in itialization, it will display an “I” in “Status 3” and complete percentage of initialization in “R%” . Figure 4.3.1 (Figure 4.3.1: Extend UDV-R0 from 80GB to 90GB.) Tips The size of UDV extension mu st be larger than original. Caution UDV Extension cannot be executed during rebuild or migration. 4.4 [...]
-
Página 63
Appendix A. Certification list • RAM i Series RAM Spec: 184pins, DDR333(PC2700), Reg.(register) or UB(Unbufferred), ECC or Non-ECC, fr om 64MB to 1GB, 32-bit or 64-bit data bus width, x8 or x16 devices , 9 to 11 bits column address. Vendor Model ATP AG64L72T8SQC4S, 512M B DDR-400 (ECC) with Samsung ATP AG28L64T8SHC4S, 1GB DDR-400 with Samsung ATP[...]
-
Página 64
OS Software/Release Numbe r Microsoft Windows Microsoft iSCSI Software Initiator Version 2.04 System Requirements: 1. Windows XP Professional with SP2 2. Windows 2000 Server with SP4 3. Windows Server 2003 with SP1 4. Windows Server 2003 R2 Linux The iSCSI Initiators are different for different Linux Kernels. 1. For Red Hat Enterprise Linux 3 (Kern[...]
-
Página 65
Dell PowerConnect 5324 Dell PowerConnect 2724 Dell PowerConnect 2708 HP ProCurve 1800-24G D-Link DGS-302 4 • Hard drive i Series support SATA I, II disks. Vendor Model Hitachi Deskstar 7K250, HDS7 22580VLSA 80, 80GB, 7200RPM, SATA, 8M Hitachi Deskstar 7K80, HDS 728080PLA380, 80GB, 7200RPM, SATA-II, 8M Hitachi Deskstar E7K500, HDS725050KLA3 60, 50[...]
-
Página 66
• PD/S.M.A.R.T. events Level Ty pe Description Info Disk inse rted Info: Disk <slot> is ins erted. Info Disk removed Info: Disk <slot> is removed. Warning S.M.A.R.T. threshold exceed condition Warning: Disk <slot> S.M.A.R.T. threshold exceed condition occurred for attribute o f 1. read error rate 2. spin up time 3. reallocated s[...]
-
Página 67
Info SES load conf. OK Info: SES configuration has been loaded. Warning SES Load Conf. Failure Error: Failed to load SES configuration. The SES device is disabled. Info SES is disabled Info: The SES device is disabled. Info SES is enabled Info: The SES device is enabled • Environmental events Level Ty pe Description Info Admin Login OK Info: Admi[...]
-
Página 68
Warning RTC Access Failed Warning: Fail to access RT C device Info Reset Password Info: Reset Admin Password to default. Info Reset IP Info: Reset network settings set to default. • System config events Level Ty pe Description Info Sys Config. Defaults Restored Info: Default system configurations restored. Info Sys NVRAM OK Info: The system NVRAM[...]
-
Página 69
Warning VG Created Fail Warning: Fail to create VG <name>. Info VG Deleted Info: VG <name> has been deleted. Info UDV Crea ted OK Info: UDV <name> has been created. Warning UDV Created F ail Warning: Fail to create UDV <name>. Info UDV Deleted Info: UDV <name> has been deleted. Info UDV Attached OK Info: UDV <name&g[...]
-
Página 70
read/write error <read | write> failed. Error PD read/write error Error: PD <#> lba <#> len gth <#> <rea d | write> error. Error UDV recoverable read/write error Error: UDV <name> stripe <#> PD <#> lba <# > length <#> <read | write> recoverable Error UDV unrecoverabl e read/write err[...]
-
Página 71
Figure C.2 4. Click “OK” . Please see Figure C.3. Figure C.3 5. Click “Targets” . Please see Figure C.4. - 71 -[...]
-
Página 72
Figure C.4 6. Click “Log On” . Please see Figure C.5. Check “Enable multi-path” if running MPIO. Figure C.5 7. Click “Advance…” if CHAP information is needed. Please see Figure C.6. - 72 -[...]
-
Página 73
Figure C.6 8. Click “OK” . The status would be “Connecte d”. Please see Figure C.7 9. Done, it can connect to an iSCSI disk. - 73 -[...]
-
Página 74
Figure C.7 The following procedure is to log off iSCSI device. - 74 -[...]
-
Página 75
1. Click “Details” . Please see Figure C.8. Figure C.8 2. Check the Identifier, which will be deleted. 3. Click “Log off” . 4. Done, the iSCSI device log off successfully. D. MPIO and MC/S setup instructions Here is the step by step to se tup MPIO . There are 2 kinds of scenarios for MPIO. Please see Figure D.1. Thecus suggests using scenar[...]
-
Página 76
Figure D.1 The setup instructions are in the following figures. 1. Create a VG . Figure D.2 2. Create a UDV. - 76 -[...]
-
Página 77
Figure D.3 3. Run Microsoft iSCSI initiator and check the Initiator Node Name. Figure D.4 4. Attaching LUN to UDV_1 UDV. Input the Initiator Node Name in Host field. Figure D.5 5. The volume config setting is done. - 77 -[...]
-
Página 78
Figure D.6 6. Check iSCSI settings. The IP addr ess of iSCSI data port 1 is 192.168.11.229, port 2 is 192.168.12.229 for example. Figure D.7 7. Add Target Portals on Microsoft iSCSI initiator. Figure D.8 8. Input the IP address of iSCSI data port 1 (192.168.11.229 as mentioned in previous page). - 78 -[...]
-
Página 79
Figure D.9 9. Add second Target Portals on Microsoft iSCSI initiator. Figure D.10 - 79 -[...]
-
Página 80
10. Input the IP address of iSCSI data port 2 (192.168.12.229 as mentioned in previous page). Figure D.11 11. The initiator setting is done. - 80 -[...]
-
Página 81
Figure D.12 12. Log on. Figure D.13 - 81 -[...]
-
Página 82
13. Enable “Enable multi-path” checkbox. Then click “Advanced” . Figure D.14 14. Select Target Portal to iSCSI da ta port 1 (192.168.11.229). Then click “OK” - 82 -[...]
-
Página 83
Figure D.15 15. Log on “Enable multi-path” again. Figure D.16 16. Enable “Enable multi-path” checkbox. Then click “Advanced…” . Figure D.17 - 83 -[...]
-
Página 84
17. Select Target Portal to iSCSI data port 2 (192.168.12. 229). Then select “OK” Figure D.18 18. iSCSI device is connected. Click “Details” . - 84 -[...]
-
Página 85
Figure D.19 19. Click “Device” tab, then click “Advanced” . Figure D.20 - 85 -[...]
-
Página 86
20. Click “MPIO” tab, select “Load Balance Policy” to “Round Robin” . Figure D.21 21. Click “Apply” . Figure D.22 - 86 -[...]
-
Página 87
22. Run “Device Manage” in Windows. Make sure MPIO device is available. Then the disk can be tested performance by IOMETER. The MC/S setup instructions are very similar to MPIO, detail steps are in the following figures. For the target side setti ng, the steps are exactly the same as MPIO. Please refer to Figure D.1 to Figure D.9 . 1. Create a [...]
-
Página 88
Figure D.24 10. Then click “Advanced…” . Figure D.25 - 88 -[...]
-
Página 89
11. Select set Local Adapter, Source IP , and Target Portal to iSCSI data port 1 (192.168.11.229). Then click “OK” . Figure D.26 12. After connected, click “Details” , then in the “Session” tab, click “Connections” . - 89 -[...]
-
Página 90
- 90 - Figure D.27 13. Choose “Round Robi n” for Load Balance Policy. 14. “Add” Source Portal for the iSCSI data port 2(192.168.12.229) Figure D.28[...]
-
Página 91
- 91 - 15. Choose “Adavanced” Figure D.29 16. Select Local adapter, Source IP, and Ta rget Portal to iSCSI data port 2 (192.168.12.229). Then select “OK” . Figure D.30 17. The MC/S setting is done.[...]